Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
2K views587 pages

Computing Programmes Syllabus 2021

Uploaded by

aceplayer547
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views587 pages

Computing Programmes Syllabus 2021

Uploaded by

aceplayer547
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 587

ACADEMIC CURRICULA

UNDERGRADUATE/ INTEGRATED POST


GRADUATE DEGREE PROGRAMMES
(With exit option of Diploma)

(Choice Based Flexible Credit System)

Regulations 2021

Volume – 11
(Syllabi for School of Computing Programme Courses)

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India
SRM INSTITUTE OF SCIENCE AND TECHNOLOGY
Kattankulathur, Chengalpattu District 603203, Tamil Nadu, India

Contents (Volume - 11)


Syllabi for Higher Semester (3 - 8) CSE Courses

No Title Page No
1 Engineering Science Course 10
21CSS201T Computer Organization and Architecture………………………………………………. 11
2 Professional Core Courses……………………………………………………………………………………... 13
21CSC201J Data Structures and Algorithms…………………………………………………………... 14
21CSC202J Operating Systems………………………………………………………………………… 16
21CSC203P Advanced Programming Practice………………………………………………………… 18
21CSC204J Design and Analysis of Algorithms………………………………………………………. 20
21CSC205P Database Management Systems………………………………………………………… 22
21CSC301T Formal Language and Automata…………………………………………………………. 24
21CSC302J Computer Networks……………………………………………………………………….. 26
21CSC303J Software Engineering and Project Management……………………………………….. 28
21CSC304J Compiler Design…………………………………………………………………………… 30
21CSC305P Machine Learning………………………………………………………………………….. 32

Volume-11A – CSE Courses 34


1 Professional Elective Courses…………………………………………………………………………………. 35
21CSE251T Digital Image Processing………………………………………………………………….. 36
21CSE252T Biometrics…………………………………………………………………………………... 38
21CSE253T Internet of Things………………………………………………………………………….. 40
21CSE254T Bio Inspired Computing…………………………………………………………………… 42
21CSE255T Computer Graphics and Animation………………………………………………………. 44
21CSE351T Computational Logic………………………………………………………………………. 46
21CSE352T Neuro Fuzzy and Genetic Programming………………………………………………... 48
21CSE353T Augmented, Virtual and Mixed Reality…………………………………………………… 50
21CSE354T Full Stack Web Development…………………………………………………………….. 52
21CSE355T Data Mining and Analytics………………………………………………………………... 54
21CSE356T Natural Language Processing……………………………………………………………. 56
21CSE357T Distributed Computing…………………………………………………………………….. 58
21CSE358T Network Security and Cryptography…………………………………………………….. 60
21CSE359T Information Storage and Management……………………………………………….. 62
21CSE360T High Performance Computing……………………………………………………………. 64
21CSE361T Database Security and Privacy…………………………………………………………... 66
1
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
21CSE362T Cloud Computing………………………………………………………………………….. 68
21CSE399T Advanced Mobile Communications……………………………………………………... 70
21CSE451T Pattern Recognition Techniques…………………………………………………………. 72
21CSE452T Semantic Web……………………………………………………………………………… 74
21CSE453T Speech Recognition……………………………………………………………………….. 76
21CSE454T Computer Vision…………………………………………………………………………… 78
21CSE455T Social Network Analysis…………………………………………………………………... 80
21CSE456T Software Defined Networks………………………………………………………………. 82
21CSE457T Service Oriented Architecture……………………………………………………………. 84
21CSE458T Wireless and Mobile Communication……………………………………………………. 86
21CSE459T Wireless Sensor Networks……………………………………………………………….. 88
21CSE460T Network Protocols and Algorithms………………………………………………………. 90

Volume-11B – CSE (AIML) Courses 92


1 Professional Core Courses……………………………………………………………………………………... 93
21CSC401J Deep Learning Techniques……………………………………………………………….. 94
21CSC402P Report Writing……………………………………………………………………………… 96
2 Professional Elective Courses…………………………………………………………………………………. 98
21CSE271T Programming in Java……………………………………………………………………… 99
21CSE272T Genetic Algorithm and its Applications………………………………………………….. 101
21CSE291T Introduction to Cognitive Neuroscience………………………………………………… 103
21CSE311P Robot Programming……………………………………………………………………….. 105
21CSE312P Software Engineering in Artificial Intelligence…………………………………………… 107
21CSE313P Accelerated Data Science………………………………………………………………… 109
21CSE323T Marketing Analytics………………………………………………………………………... 111
21CSE326T Artificial Neural Networks…………………………………………………………………. 113
21CSE371T Advanced Algorithms……………………………………………………………………… 115
21CSE375T Computational Neuroscience…………………………………………………………….. 117
21CSE376T Nature Inspired Computing Techniques………………………………………………… 119
21CSE377T Information Retrieval………………………………………………………………………. 121
21CSE396T Design Principles of Smart Space Management………………………………………. 123
21CSE397T Philosophy of Cognitive Science…………………………………………………………. 125
21CSE398T Logic and Knowledge Representation………………………………………................. 127
21CSE411T Artificial Intelligence in Genomics and Disease Prediction……………………………. 129
21CSE412T Machine Learning in Drug Discovery……………………………………………………. 131
21CSE414T IoT Concepts and Applications…………………………………………………………... 133
21CSE415T Fuzzy Logic and its Applications…………………………………………………………. 135
21CSE416T Robotics: Computational Motion Planning……………………………………………… 137

2
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
21CSE417T Reinforcement Learning Techniques……………………………………………………. 139
21CSE418T Cyber Physical Systems………………………………………………………………….. 141
21CSE421T Business Intelligence and Analytics……………………………………………………... 143

Volume-11C – CSE (SWE) Courses 145


1 Professional Core Courses……………………………………………………………………………………... 146
21CSC309J Software Architecture and Design……………………………………………………….. 147
21CSC403T Software Measurements and Metrics……………………………………………………. 149
21CSC404T Software Verification and Validation……………………………………………………... 151
2 Professional Elective Courses…………………………………………………………………………………. 153
21CSE275T Requirements Engineering……………………………………………………………….. 154
21CSE276T Software Quality Management…………………………………………………………… 156
21CSE277T Software Process………………………………………………………………………….. 158
21CSE271T Programming in Java……………………………………………………………………… 160
21CSE391P User Interface Design……………………………………………………………………… 162
21CSE392P Visual Programming………………………………………………………………………. 164
21CSE393P Machine Learning Techniques…………………………………………………………… 166
21CSE312P Software Engineering in Artificial Intelligence…………………………………………… 168
21CSE391T Object Oriented Software Engineering………………………………………………….. 170
21CSE392T Python for Software Engineering………………………………………………………… 172
21CSE393T Analysis of Software Artifacts…………………………………………………………….. 174
21CSE396T Design Principles of Smart Space Management………………………………………. 176
21CSE421T Business Intelligence and Analytics……………………………………………………... 178
21CSE493T Software Security………………………………………………………………………….. 180
21CSE495T Artificial Intelligence in Agile Systems…………………………………………………… 182
21CSE496T Deep Learning……………………………………………………………………………... 184
21CSE497T Gaming and Virtual Reality……………………………………………………………….. 186
21CSE498T Smartphone Computing and its Applications………………………………………….. 188

Volume-11D – CSE (CC) Courses 190


1 Professional Core Courses……………………………………………………………………………………... 191
21CSC314P Big Data Essentials ……………………………………………………………………….. 192
21CSC316J Cloud Architecture and Protocols………………………………………………………… 194
2 Professional Elective Courses…………………………………………………………………………………. 196
21CSE261T Fundamentals of Cloud Computing………………………………………………………. 197
21CSE262T Communication Systems Engineering…………………………………………………… 199
21CSE263T Digital Communication Systems…………………………………………………………. 201
21CSE330T Cloud Architecture…………………………………………………………………………. 203

3
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
21CSE329T Service Oriented Architecture and Microservices………………………………………. 205
21CSE363T Cloud Services Solution Architect……………………………………………………….. 207
21CSE364T Data Centric Networking and System Design………………………………………….. 209
21CSE461T Cloud Security……………………………………………………………………………… 211
21CSE463T Cloud Strategy Planning and Management…………………………………………….. 213
21CSE464T Fog Computing Analytics…………………………………………………………………. 215
21CSE465T Cloud Application Development………………………………………………………….. 217
21CSE466T Network Design and Management………………………………………………………. 219

Volume-11E – CSE (CN) Courses 221


1 Professional Core Courses……………………………………………………………………………………... 222
21CSC311J Wireless Networks ………………………………………………………………………… 223
21CSC312J Mobile Adhoc Networks…………………………………………………………………… 225
2 Professional Elective Courses…………………………………………………………………………………. 227
21CSE273T Distributed Operating Systems…………………………………………………………… 228
21CSE274T Pervasive Computing……………………………………………………………………… 230
21CSE347T Network Protocols and Programming…………………………………………………… 232
21CSE348T Network Routing Algorithms……………………………………………………………… 234
21CSE349T Optical Networks…………………………………………………………………………… 236
21CSE350T Principles Of Cloud Computing…………………………………………………………... 238
21CSE450T Network Security…………………………………………………………………………... 240
21CSE466T Network Design and Management………………………………………………………. 242

Volume-11F – CSE (CS) Courses 244


1 Professional Core Courses……………………………………………………………………………………... 245
21CSC308T Security Risk Management Principles …………………………………………………… 246
21CSC310J Malware Analysis…………………………………………………………………………... 248
2 Professional Elective Courses…………………………………………………………………………………. 250
21CSE229J Check Point System Administration……………………………………………………. 251
21CSE281T Cryptography and Network Security……………………………………………………… 253
21CSE282T Information Security……………………………………………………………………….. 255
21CSE283T Cyber Law………………………………………………………………………………….. 257
21CSE381T Forensics and Incident Response……………………………………………………….. 259
21CSE382T Security Management……………………………………………………………………... 261
21CSE383T Security Governance, Risk and Compliance…………………………………………… 263
21CSE384J Security Audit and Risk Assessment……………………………………………………. 265
21CSE385J Advanced Malware Analysis……………………………………………………………… 267
21CSE386J Penetration Testing and Vulnerability Assessment……………………………………. 269

4
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
21CSE387J Hacker Techniques, Tools, and Incident Handling…………………………………….. 271
21CSE399J Comprehensive Linux for All……………………………………………………………… 273
21CSE485T Database Security…………………………………………………………………………. 275
21CSE486T Operation System Security……………………………………………………………….. 277
21CSE487T Cyberwarfare……………………………………………………………………………… 279
21CSE488T Hacker Mind: Profiling The IT Criminal……………………..…………………………. 281
21CSE489T Mobile and Wireless Security…………………………………………………………….. 283
21CSE490J Windows and Linux Internals…………………………………………………………….. 285
21CSE491T Cyber Crime and Digital Forensics……………………………………………………. 287
21CSE492T Cyber Crimes and Cyber Security……………………………………………………….. 289

Volume-11G – CSE (IT) Courses 291


1 Professional Core Courses……………………………………………………………………………………... 292
21CSC314P Big Data Essentials………………………………………………………………………… 293
21CSC317J Information Retrieval Techniques………………………………………………………… 295
2 Professional Elective Courses…………………………………………………………………………………. 297
21CSE267T Statistics for Machine Learning…………………………………………………………… 298
21CSE310J Quantum Computation……………………………………………………………………. 300
21CSE373T Streaming Analytics……………………………………………………………………….. 302
21CSE475T Applied Graph Theory…………………………………………………………………….. 304
21CSE476T Logical Deduction and Non-Verbal Reasoning…………………………………………. 306
21CSE477T Cloud Native Architecture for Modern Platforms……………………………………….. 308
21CSE479T Fault Tolerant Systems…………………………………………………………………… 310
21CSE480T Image and Video Processing…………………………………………………………….. 312

Volume-11H – CSE (IoT) Courses 314


1 Professional Core Courses……………………………………………………………………………………... 315
21CSC313J Cloud Computing for IoT…………………………………………………………………... 316
21CSC315J Fog Computing…………………………………………………………………………….. 318
2 Professional Elective Courses…………………………………………………………………………………. 320
21CSE264T Introduction to IoT: Sensors, Actuators and Microcontrollers………………………….. 321
21CSE265T Introduction to Embedded Programming and Embedded OS…………………………. 323
21CSE266T Internet of Things Architecture and Protocols………………………………………….. 325
21CSE365T Machine Learning for IoT…………………………………………………………………. 327
21CSE366T Introduction to Cloud Application Development for IoT………………………………… 329
21CSE367T IoT Forensics………………………………………………………………………………. 331
21CSE368J Network Programming for IoT……………………………………………………………. 333
21CSE369J Introduction to Security of Internet of Things and Cyber-Physical Systems………….. 335

5
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
21CSE370J Data Visualization for IoT…………………………………………………………………. 337
21CSE371J IoT Techniques, Tools, and its Application……………………………………………… 339
21CSE467T Advanced Database Systems……………………………………………………………. 341
21CSE468T Edge Computing…………………………………………………………………………… 343
21CSE469T Energy Management for IoT Devices…………………………………………………… 345
21CSE470T Applied Software Techniques in IoT Engineering……………………………………… 347
21CSE471T Fundamentals of Cyber Security………………………………………………………… 349
21CSE472J Full Stack Development for IoT………………………………………………………….. 351
21CSE473T Deep Learning for IoT…………………………………………………………………….. 353
21CSE474T IoT Privacy…………………………………………………………………………………. 355

Volume-11I – CSE (BCT) Courses 357


1 Professional Core Courses……………………………………………………………………………………... 358
21CSC305T Blockchain using Cryptography…………………...…………………………………….. 359
2 Professional Elective Courses…………………………………………………………………………………. 361
21CSE231T Fundamentals of Blockchain…………………………………………………………… 362
21CSE232T IoT and Blockchain……………………………………………………………………… 364
21CSE233T Distributed Systems and Applications…………………………………………………… 366
21CSE234T Principles of Cryptography……………………………………………………………….. 368
21CSE331T Cryptocurrencies and Blockchain Technology……………………………..………….. 370
21CSE332T Fundamentals of Ethereum………………………………………………………………. 372
21CSE333T AI and Blockchain………………..………………………………………………………. 374
21CSE334T Container Management…………………………………………………………………… 376
21CSE335T Advanced Cryptography………………………………………………………………….. 378
21CSE336T Cloud Computing with Blockchain……………………………………………………….. 380
21CSE337T Web3 Development……………………………………………………………………….. 382
21CSE338T Trust Based Computing…………………………………………………………………… 384
21CSE431T Building Private Blockchain………………………………………………………………. 386
21CSE432T Blockchain Technology with Hyperledger………………………………..……………. 388
21CSE433T Blockchain Business Models…………………………………..………………………... 390
21CSE434T Distributed Ledger Technology…………………………………………………………... 392
21CSE435T Smart Contracts and Application Development………………………………………… 394
21CSE436T Bitcoin Essentials and Use Cases……………………………………………………….. 396
21CSE437T Decentralized Applications on Blockchain…………………………………………….. 398
21CSE438T Web Security……………………………………………………………………………….. 400

Volume-11J – CSE (GT) Courses 402


1 Professional Core Courses……………………………………………………………………………………... 403

6
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
21CSC306J Software Engineering Perspectives in Computer Game Development……………… 404
21CSC307T Deep Learning in Gaming and Application………………………………………………. 406
2 Professional Elective Courses…………………………………………………………………………………. 408
21CSE235T Game Design, Prototyping and Development…………………………………………... 409
21CSE236T GPU Programming………………………………………………………………………… 411
21CSE237T Art Creation for Games…………………………………………………………………… 413
21CSE238T Storytelling for Marketing…………………………………………………………………. 415
21CSE339T Game Artificial Intelligence………………………………………………………………... 417
21CSE340T Analytics and Decision Making…………………………………………………………... 419
21CSE341T Computer Graphics………………………………………………………………………... 421
21CSE342T Gaming Studio for Business………………………………………………………………. 423
21CSE343T Web Services Development for Games………………………………………………… 425
21CSE344T 3D Game Development with Unity…………………………………………………….. 427
21CSE345T Game System Integration………………………………………………………………… 429
21CSE346T Design Art and Theory……………………………………………………………………. 431
21CSE439T Virtual Reality and Augmented Reality………………………………………………….. 433
21CSE440T Computer Animation and Simulation……………………………………………………. 435
21CSE441T Mobile Game Development………………………………………………………………. 437
21CSE442T Game Monetization Techniques…………………………………………………………. 439
21CSE443T Game Production and Publishing………………………………………………………... 441
21CSE444T Applied Gamification………………………………………………………………………. 443
21CSE445T Metaverse Fundamentals………………………………………………………………… 445
21CSE446T Digital Marketing and Publishing………………………………………………………… 447

Volume-11K – CSE (BD & DS) Courses 449


1 Engineering Science Course 450
21CSS202T Fundamentals of Data Science………………………………………………………… 451
21CSS301T Full Stack Development …………………………………………………………………………………………. 453
2 Professional Core Courses……………………………………………………………………………………... 455
21CSC206P Advanced Object Oriented Programming…………………………………………... 456
21CSC307P Machine Learning for Data Analytics…………………………………………………….. 458
3 Professional Elective Courses…………………………………………………………………………………. 460
21CSE222T Big Data Tools and Techniques…………………………………………………………... 461
21CSE224T Computer Architecture…………………………………………………………………….. 463
21CSE321T Data Warehousing and Data Mining…………………………………………………….. 465
21CSE322T Multivariate Techniques for Data Analytics……………………………………………… 467
21CSE323T Marketing Analytics………………………………………………………………………... 469
21CSE325T Applied Social Network Analysis………………………………………………………… 471

7
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
21CSE326T Artificial Neural Networks…………………………………………………………………. 473
21CSE327T Cloud Computing for Data Analytics…………………………………………………….. 475
21CSE373T Streaming Analytics……………………………………………………………………….. 477
21CSE421T Business Intelligence and Analytics……………………………………………………... 479
21CSE422T Convolutional Neural Networks………………………………………………………….. 481
21CSE423T Big Data Visualization…………………………………………………………………….. 483
21CSE424T Deep Learning for Data Analytics………………………………………………………... 485
21CSE425T Advanced Machine Learning……………………………………………………………... 487
21CSE426T Financial Machine Learning………………………………………………………………. 489
21CSE427T Augmented and Virtual Reality…………………………………………………………… 491
21CSE428T Healthcare Analytics………………………………………………………………………. 493
21CSE429T Data Science for Internet of Things……………………………………………………… 495
21CSE430T Automatic Speech Recognition…………………………………………………………... 497
21CSE447T Robot Motion Planning…………………………………………………………………… 499
21CSE448T Bio-Inspired Computing and Fuzzy Logic………………………………………………. 501
21CSE449T Risk Analytics………………………………………………………………………………. 503

Volume-11L – M.Tech(Int) CSE (CC) Courses 505


1 Professional Core Courses……………………………………………………………………………………... 506
21CSC505T Computer Graphics and Vision…………………………………………………………… 507
21CSC506J Computation and Cognition: The Probabilistic Approach…………………………….. 509
2 Professional Elective Courses…………………………………………………………………………………. 511
21CSE541T Probabilistic Graphical Models: Principles and Techniques…………………………… 512
21CSE542T Deep Generative Models…………………………………………………………………. 514
21CSE543T Brain Machine Interface: Science, Technology and Application……………………… 516
21CSE544T Data Analysis and Visualization………………………………………………………….. 518
21CSE545T Computational Perception and Cognition……………………………………………….. 520
21CSE546T Medical Signal Processing………………………………………………………………... 522
21CSE547T Deep Multitask and Meta Learning……………………………………………………….. 524
21CSE548T Spatial and Temporal Computing………………………………………………………… 526
21CSE549T Decision Making Under Uncertainty……………………………………………………… 528
21CSE499T Neural Network Models of Cognition……………………………………………………... 530
21CSE552T Computational Linguistics………………………………………………………………… 532
21AIE536T Artificial Intelligence Engines……………………………………………………………... 534
21AIE538T Artificial Intelligence for Industrial Applications………………………………………….. 536
21AIE539T Artificial Intelligence in Medical Imaging…………………………………………………. 538
21AIE541T Multimodal Machine Learning…………………………………………………………….. 540

8
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Volume-11M – M.Tech(Int) CSE (CS & DF) Courses 542
1 Professional Core Courses……………………………………………………………………………………... 543
21CSC503T Security Service Management……………………………………………………………. 544
21CSC504J Android Malware Analysis………………………………………………………………… 546
2 Professional Elective Courses…………………………………………………………………………………. 548
21CSE531T Cyber Security Operations……………………………………………………………… 549
21CSE532T Network Management and Protocols……………………………………………………. 551
21CSE533T Firewalls and Access Controls…………………………………………………………… 553
21CSE534T Network Programming and Management……………………………………………….. 555
21CSE535T Network Intrusions and Computer Forensics……………………………………………. 557
21CSE536T Mobile Forensics…………………………………………………………………………… 559
21CSE537T Digital Forensics…………………………………………………………………………… 561
21CSE538T Security Scripting and Analysis…………………………………………………………… 563
21CSE539T Principles of Secure Coding Principles…………………………………………………... 565
21CSE540T Android Security and Design Internals…………………………………………………… 567

Volume-11N – M.Tech(Int) CSE (DS) Courses 569


1 Professional Core Courses……………………………………………………………………………………... 570
21CSC501T Natural Language Processing Techniques……………………………………………… 571
21CSC502J Applied Deep Learning……………………………………………………………………. 573
2 Professional Elective Courses…………………………………………………………………………………. 575
21CSE521T Advanced Algorithms Analysis…………………………………………………………… 576
21CSE522T Functional Programming………………………………………………………………….. 578
21CSE524T Computer Vision Techniques…………………………………………………………….. 580
21CSE527T Text Mining and Analytics………………………………………………………………… 582
21CSE529T Web Intelligence………………………………………………………………………….... 584

9
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Engineering Science Course

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

10
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSS201T COMPUTER ORGANIZATION AND ARCHITECTURE S ENGINEERING SCIENCES
Code Name Category 3 1 0 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the Fundamentals of computers, Memory operations and Addressing Modes 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: know about Functions of Arithmetic and Logic unit

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: explore the Operations of Control Unit, Execution of Instruction and Pipelining

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: classify the Need for Parallelism, Multicore and Multiprocessor Systems

Environment &
Sustainability
CLR-5: understand the Concepts and functions of Memory unit, I/O unit

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify the computer hardware and how software interacts with computer hardware 3 2 - - - - - - - - - - 1 - -
apply Boolean algebra as related to designing computer logic, through simple combinational and
CO-2: 3 2 - - - - - - - - - - - 2 -
sequential logic circuits
CO-3: examine the detailed operation of Basic Processing units and the performance of Pipelining 3 - - - - - - - - - - - - - 1
CO-4: analyze concepts of parallelism and multi-core processors 3 - - - - - - - - - - - - 2 -
CO-5: classify the memory technologies, input-output systems and evaluate the performance of memory system 3 2 - - - - - - - - - - - 3 -

Unit-1 – Introduction to Number System 12 Hour


Introduction to Number System and Logic Gates: Number Systems- Binary, Decimal, Octal, Hexadecimal; Codes- Grey, BCD, Excess-3, ASCII, Parity; Binary Arithmetic- Addition, Subtraction, Multiplication, Division
using Sign Magnitude,1’s compliment, 2’s compliment, BCD Arithmetic; Logic Gates-AND, OR, NOT, NAND, NOR, EX-OR, EX-NOR.
Unit-2 - Architectures 12 Hour
Basic structure of computers: Functional Units of a computer, Operational concepts, Bus structures, Memory addresses and operations, assembly language, Instructions, Instruction sequencing, Addressing modes.
Case study: 8086.
Unit-3 - Design of ALU 12 Hour
De Morgan’s Theorem, Adders, Multiplier – Unsigned, Signed, Fast, Carry Save Addition of summands; Division–Restoring and Non-Restoring; IEEE 754 Floating point numbers and operations
Unit-4 - Control Unit 12 Hour
Basic processing unit, ALU operations, Instruction execution, Branch instruction, Multiple bus organization, Hardwired control, Generation of control signals, Micro-programmed control; Pipelining: Basic concepts of
pipelining, Performance, Hazards-Data, Instruction and Control, Influence on instruction sets.
Unit-5 - Parallelism 12Hour
Need, types, applications and challenges, Architecture of Parallel Systems-Flynn’s classification; ARM Processor: The thumb instruction set, Processor and CPU cores, Instruction Encoding format, Memory load
and Store instruction, Basics of I/O operations. Case study: ARM 5 and ARM 7 Architecture.

11
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. CarlHamacher,ZvonkoVranesic,SafwatZaky,Computer Organization,5thed.,McGraw-Hill,2015 5. WilliamStallings, Computer Organization and Architecture–DesigningforP
Learning 2. AiHwang,FayeA.Briggs,Computer Architecture and Parallel rocessing”,3rded.,McGrawHill,2016 erformance,10thed.,Pearson Education,2015
Resources 3. GhoshT.K.,Computer Organization and Architecture,3rded.,TataMcGraw-Hill,2011 6. DavidA.Patterson and JohnL. Hennessy Computer Organization and Design-A Hardware
4. P.Hayes, Computer Architecture and Organization, 3rded. McGrawHill, 2015. software interface, 5thed., Morgan Kaufmann,2014

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 30% - 30% -
Level 2 Understand 30% - 30% - 30% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Saminath Sanjai, Borqs Technologies,Inc. Bengaluru 1. Dr.K.Vijaya, , SRMIST
2. Dr.Anitha D, SRMIST

12
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Core Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

13
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC201J DATA STRUCTURES AND ALGORITHMS C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
know about searching and sorting techniques used to handle a set of data along with time and space Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
complexity
CLR-2: utilize various categories of list structures to develop solutions

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: explore usage of Stack and Queues in processing data for real time applications

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand tree structure and its applications

Environment &
Sustainability
CLR-5: utilize hash tables for data storage and use graphs to solve real time problems

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: devise algorithms to arrange the data in required order and retrieve a specific datum in efficient manner 1 2 3 - - - - - - - - 3 3 - -
determine the type of list structure that could be used for solving a problem and implement it using C
CO-2: 2 3 3 - - - - - - - - 3 3 - -
programming language
CO-3: devise solutions using linear structures Stack and Queue 2 3 3 - - - - - - - - 3 3 - -
CO-4: express proficiency in usage of tree for solving problems 2 3 3 - - - - - - - - 3 3 - -
CO-5: implement Hash tables for storing data and algorithms to find shortest path between nodes in a graph 3 2’ 3 - - - - - - - - 3 3 - -

Unit-1 - Introduction 15 Hour


Programming in C - Primitive data types, Structures, Self-referential structures, Pointers and structures, Dynamic memory allocation, Matrix multiplication; Data Structure – Definition, Types, ADT, Operations;
Mathematical notations - Big O, Omega and Theta, Complexity – Time, Space, Trade off.
Unit-2 - List Structure 15 Hour
Operations on List ADT – Create, Insert, Search, Delete, Display elements; Implementation of List ADT– Array, Cursor based and Linked; Types – Singly, Doubly, Circular; Applications - Sparse Matrix, Polynomial
Arithmetic, Joseph Problem
Unit-3 - Stack and Queue 15 Hour
Operations on Stack ADT – Create, Push, Pop, Top; Implementation of Stack ADT – Array and Linked; Applications - Infix to Postfix Conversion, Postfix Evaluation, Balancing symbols, Function Calls, Tower of
Hanoi; Operations on Queue ADT - Create, Enqueue and Dequeue; Implementation of Queue ADT – Array and Linked; Types of Queue - Circular, Double ended and Priority Queue, Applications – Scheduling
Unit-4 - Trees and Hashing 15 Hour
Introduction to Trees, Tree traversals, Complete Binary Tree and its height, Binary Search Trees, Need for Balance, Rotation, AVL trees, B Trees, Heaps, trees and array implementations and applications; Hash
functions - Introduction, functions, Collision avoidance, Separate chaining, Open Addressing, Linear Probing, Quadratic probing.
Unit-5 - Graph 15 Hour
Introduction to Graph, Graph Traversal, Topological sorting, Minimum spanning tree – Prims Algorithm, Kruskal’s Algorithm, Shortest Path Algorithm - Dijkstra’s Algorithm

14
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Lab Experiments
Lab 1: Implementation of Structures
Lab 2: Implementation of Structures using Pointers
Lab 3: Implementation of Matrix Multiplication – Dynamic Memory allocation
Lab 4: Array Implementation of List
Lab 5: Implementation of Linked List
Lab 6: Implementation of Doubly linked List
Lab 7: Implementation of Stack using array and Linked List
Lab 8: Implementation of Queue using array and Linked list
Lab 9: Applications of Stack, Queue
Lab 10: Implementation of Tree using array
Lab 11: Implementation of BST using linked list
Lab 12: Implementation of B-Trees
Lab 13: Implementation of Graph using Array
Lab 14: Implementation of Shortest path Algorithm
Lab 15: Implementation of Minimal Spanning Tree

1. Seymour Lipschutz, Data Structures with C, McGraw Hill, 2014 4. Mark Allen Weiss, Data Structures and Algorithm Analysis in C, 2nd ed., Pearson Education, 2015
Learning 2. R.F.Gilberg, B.A.Forouzan, Data Structures, 2nd ed., Thomson India, 2005 5. Reema Thareja, Data Structures Using C, 1st ed., Oxford Higher Education, 2011,
Resources 3. A.V.Aho, J.E Hopcroft , J.D.Ullman, Data structures and Algorithms, Pearson 6. Thomas H Cormen, Charles E Leiserson, Ronald L Revest, Clifford Stein, Introduction to Algorithms
Education, 2003 3rd ed., The MIT Press Cambridge, 2014

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - - 10% 25% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 20% - - 30% 20% -
Level 4 Analyze 20% - - 30% 20% -
Level 5 Evaluate 10% - - 10% 10% -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Mariappan Vaithilingam, Senior Engineering Manager, Uber 1. Dr. Venkatesh Raman, Professor, Mathematical Institute of 1. Dr. K. Vijaya, SRMIST
India Research and Development Pvt Centre, Bangalore. Science
2. Dr. S. Poornima, SRMIST
3. Dr. P. Saranya, SRMIST

15
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC202J OPERATING SYSTEMS C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline the structure of OS and basic architectural components involved in OS design 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: introduce the concept of deadlock and various memory management mechanism

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: familiarize the scheduling algorithms, file systems, and I/O schemes

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: identify and tell the various embedded operating systems and computer security concepts

Environment &
Sustainability
CLR-5: name the various computer security techniques in windows and Linux

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: use the appropriate concepts of operating system for resource utilization 3 3 2 2 - - - - - - - 3 2 - -
CO-2: choose the relevant process and thread concepts for solving synchronization problems 3 3 3 2 - - - - - - - 3 2 - -
CO-3: exemplify different types of scheduling algorithms and deadlock mechanism 3 3 3 2 - - - - - - - 3 2 - -
experiment the performance of different algorithms used in management of memory, file and I/O and select
CO-4: 3 3 3 2 - - - - - - - 3 2 - -
the appropriate one
demonstrate different device and resource management techniques for memory utilization with security
CO-5: 3 2 3 2 - - - - - - - 3 2 - -
mechanisms

Unit-1 - Introduction 15 Hour


Computer-System Organization, Computer-System Architecture, Operating-System Structure, Operating-System Operations, Process Management, Memory Management, Storage Management, Protection and
Security, Kernel Data Structures, Computing Environments, Open-Source Operating Systems, Operating-System Services, User and Operating-System Interface, System Calls, Types of System Calls, System
Programs, Operating-System Design and Implementation, Operating-System Structure, Operating-System Debugging, Operating-System Generation, System Boot.
Unit-2 - Process Management 15 Hour
Process Concept, Process Scheduling, Operations on Processes, Interprocess Communication, Communication in Client– Server Systems, Threads: Multicore Programming, Multithreading Models, Thread Libraries,
Implicit Threading, Threading Issues. Process Synchronization: The Critical-Section Problem, Peterson’s Solution, Synchronization Hardware, Mutex Locks, Semaphores, Classic Problems of Synchronization,
Monitors
Unit-3 - CPU Scheduling 15 Hour
Basic Concepts, Scheduling Criteria, Scheduling Algorithms, Thread Scheduling, Multiple-Processor Scheduling, Real-Time CPU Scheduling. Deadlocks: System Model, Deadlock Characterization, Methods for
Handling Deadlocks, Deadlock Prevention, Deadlock Avoidance, Deadlock Detection, Recovery from Deadlock
Unit-4 - Memory Management 15 Hour
Main Memory, Swapping, Contiguous Memory Allocation, Segmentation, Paging, Structure of the Page Table. Virtual Memory: Introduction, Demand Paging, Copy-on-Write, Page Replacement, Allocation of Frames,
Thrashing, Memory-Mapped Files, Allocating Kernel Memory. STORAGE MANAGEMENT: Disk Structure, Disk Attachment, Disk Scheduling, Disk Management, Swap-Space Management, RAID Structure. File-
System Interface: File Concept, Access Methods, Directory and Disk Structure, File-System Mounting, File Sharing, Protection. .

16
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Protection and Security 15 Hour
Goals of Protection, Principles of Protection, Domain of Protection, Access Matrix, Implementation of the Access Matrix, Access Control, Revocation of Access Rights, Capability-Based Systems, Language-Based
Protection, The Security Problem, Program Threats, System and Network Threats, Cryptography as a Security Tool, User Authentication, Implementing Security Defenses, Firewalling to Protect Systems and
Networks, Computer-Security Classifications.
Lab Experiments
Lab 1: Operating system Installation, Basic Linux commands Lab 6: Dining Philosopher problem Lab 11: LRU and LFU Page Replacement Algorithm
Lab 2: Process Creation using fork() and Usage of getpid(), getppid(), wait() functions Lab 7: Bankers Algorithm for Deadlock avoidance Lab 12: Best fit and Worst fit memory management policies
Lab 3: Multithreading Lab 8: FCFS and SJF Scheduling Lab 13: Disk Scheduling algorithm
Lab 4: Mutual Exclusion using semaphore and monitor Lab 9: Priority and Round robin scheduling Lab 14: Sequential and Indexed file Allocation
Lab 5: Reader-Writer problem Lab 10: FIFO Page Replacement Algorithm Lab 15: File organization schemes for single level and two-level
directory

1. Abraham Silberschatz, Peter Baer Galvin, and Greg Gagne, “Operating System Concepts”, John Wiley & Sons (Asia) 6. Charles Crowley, “Operating Systems: A Design-Oriented
Pvt. Ltd, Tenth Edition, 2018 Approach”, Tata McGraw Hill Education, 2017
2. RamazElmasri, A. Gil Carrick, David Levine, “Operating Systems – A Spiral Approach “, Tata McGraw Hill Edition, 2010 7. https://nptel.ac.in/courses/106/105/106105214/
Learning
3. Dhananjay M. Dhamdhere, “Operating Systems – A Concept Based Approach”, Third Edition, Tata McGraw Hill Edition, 8. https://nptel.ac.in/courses/106/106/106106144/
Resources
2019 9. https://nptel.ac.in/courses/106/102/106102132/
4. Andrew S. Tanenbaum, “Modern Operating Systems”, Fourth Edition, Global Edition, Pearson, 2015. 10. https://onlinecourses.nptel.ac.in/noc21_cs44/preview
5. William Stallings, “Operating Systems: Internals and Design Principles”, Pearson Education, Sixth Edition, 2018. 11. https://nptel.ac.in/courses/106/105/106105172/

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - - 20% -
Level 2 Understand 40% - - 40% 40% -
Level 3 Apply 20% - - 40% 20% -
Level 4 Analyze 20% - - 10% 10% -
Level 5 Evaluate - - - 10% 10% -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.T.Madhan, Team Leader, Tata Consultancy Services, 1. Dr. S. Janakiraman, Associate Professor, Pondicherry University, 1. Dr. N. Prasath, SRMIST
siruseri Campus, Chennai, [email protected] [email protected]
2. Mrs.K.Saranya, IT Analyst, Tata Consultancy Services, 2. Dr. R.Shyamala, Associate Professor, Anna University College of 2. Dr. M. Eliazer, SRMIST
siruseri Campus, Chennai, [email protected] Engineering Tindivanam, [email protected]

17
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC203P ADVANCED PROGRAMMING PRACTICE C PROFESSIONAL CORE
Code Name Category 3 1 0 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the paradigm functionalities and their hierarchy 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: deploy structural, procedural, and Object-Oriented Programming Paradigm

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: demonstrate the event, Graphical User Interface, and declarative Paradigm with a java application

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: extended knowledge on logic, functional, network and concurrent Paradigm

Environment &
Sustainability
CLR-5: symbolic, Automata-based, and Event with a python application

solutions

society

PSO-1

PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: devise solutions to the various programming paradigm 3 2 - - - - - - - - - - 2 - -
CO-2: express proficiency in the usage of structural, procedural, and Object-Oriented Program 3 2 - 1 - - - - - - - - 2 - -
CO-3: determine the Java application using declarative, event, and graphical user interface paradigm 3 - 2 1 2 - - - 1 - - - 2 - -
CO-4: express proficiency in the usage of logic, functional, network, and concurrent Paradigm 3 2 - 1 - - - - - - - - 2 - -
determine the Python application using symbolic, automata-based, and graphical user interface
CO-5: 3 - 2 1 2 - - - 1 - - - 2 - -
programming paradigms

Unit-1 - Introduction to Programming Paradigm 12 Hour


Programming Languages – Elements of Programming languages - Programming Language Theory - Bohm- Jacopini structured program theorem - Multiple Programming Paradigm – Programming Paradigm
hierarchy – Imperative Paradigm: Procedural, Object-Oriented and Parallel processing – Declarative programming paradigm: Logic, Functional and Database processing - Machine Codes – Procedural and Object-
Oriented Programming – Suitability of Multiple paradigms in the programming language - Subroutine, method call overhead and Dynamic memory allocation for message and object storage - Dynamically dispatched
message calls and direct procedure call overheads – Object Serialization – parallel Computing
Unit-2 - Java Programming Paradigms 12 Hour
Object and Classes; Constructor; Data types; Variables; Modifier and Operators - Structural Programming Paradigm: Branching, Iteration, Decision making, and Arrays - Procedural Programming Paradigm:
Characteristics; Function Definition; Function Declaration and Calling; Function Arguments - Object-Oriented Programming Paradigm: Abstraction; Encapsulation; Inheritance; Polymorphism; Overriding - Interfaces:
Declaring, implementing; Extended and Tagging - Package: Package Creation.
Unit-3 - Advanced Java Programming Paradigms 12 Hour
Concurrent Programming Paradigm: Multithreading and Multitasking; Thread classes and methods - Declarative Programming Paradigm: Java Database Connectivity (JDBC); Connectivity with MySQL – Query
Execution; - Graphical User Interface Based Programming Paradigm: Java Applet: Basics and Java Swing: Model View Controller (MVC) and Widgets; Develop a java project dissertation based on the programming
paradigm.
Unit-4 - Pythonic Programming Paradigm 12 Hour
Functional Programming Paradigm: Concepts; Pure Function and Built-in Higher-Order Functions; Logic Programming Paradigm: Structures, Logic, and Control; Parallel Programming Paradigm: Shared and
Distributed memory; Multi-Processing – Ipython; Network Programming Paradigm: Socket; Socket Types; Creation and Configuration of Sockets in TCP / UDP – Client / Server Model.

18
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Formal and Symbolic Programming Paradigm 12 Hour
Automata Based programming Paradigm: Finite Automata – DFA and NFA; Implementing using Automaton Library - Symbolic Programming Paradigm: Algebraic manipulations and calculus; Sympy Library - Event
Programming Paradigm: Event Handler; Trigger functions and Events – Tkinter Library. Develop a python-based project dissertation based on the programming paradigm.

1. Elad Shalom, A Review of Programming Paradigms throughout the History: With a 3. Herbert Schildt, Java: The Complete Reference Seventh Edition, 2016.
Learning suggestion Toward a Future Approach, Kindle Edition, 2018 4. Mark Lutz, Programming Python: Powerful Object-Oriented Programming, 2011.
Resources 2. Maurizio Gabbrielli, Simone Martini, Programming Languages: Principles and
Paradigms, 2010.

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Project Based Learning Report and Viva Voce Final Examination
Bloom’s
CLA-1 Average of unit test CLA-2 (20% weightage) (0% weightage)
Level of Thinking
(20%) (60%)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - -- 20% - 10% - -
Level 2 Understand 30% - - 20% - 10% - -
Level 3 Apply 20% - - 20% - 10% - -
Level 4 Analyze 20% - - 20% - 10% - -
Level 5 Evaluate - - - 10% - 30% - -
Level 6 Create - - - 10% - 30% - -
Total 100 % 100 % 100 % -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. N. Venkatesh, Tech Lead, Honeywell, Bengaluru, 1. Dr. Sudeepta Mishra, Assistant Professor, Computer Science and 1. Dr Ramkumar J, SRMIST
Karnataka, India Engineering, Indian Institute of Information Technology, Ropar, Punjab.

19
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC204J DESIGN AND ANALYSIS OF ALGORITHMS C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: design efficient algorithms in solving complex real time problems 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: analyze various algorithm design techniques to solve real time problems in polynomial time

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


CLR-3: utilize various approaches to solve greedy and dynamic algorithms

Modern Tool Usage

Life Long Learning


complex problems
CLR-4: utilize back tracking and branch and bound paradigms to solve exponential time problems

Problem Analysis

Communication
Environment &
analyze the need of approximation and randomization algorithms, utilize the importance Non polynomial

Sustainability
CLR-5:
algorithms

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply efficient algorithms to reduce space and time complexity of both recurrent and non-recurrent relations 2 1 2 1 - - - - - 3 - 3 3 1 -
CO-2: solve problems using divide and conquer approaches 2 1 2 1 - - - - - 3 - 3 3 1 -
CO-3: apply greedy and dynamic programming type’s techniques to solve polynomial time problems 2 1 2 1 - - - - - 3 - 3 3 1 -
CO-4: create exponential problems using backtracking and branch and bound approaches 2 1 2 1 - - - - - 3 - 3 3 1 -
interpret various approximation algorithms and interpret solutions to evaluate P type, NP Type, NPC, NP Hard
CO-5: 2 1 2 1 - - - - - 3 - 3 3 1 -
problems

Unit-1 - Introduction to Algorithm Design 15 Hour


Fundamentals of Algorithms- Correctness of algorithm - Time complexity analysis - Insertion sort-Line count, Operation count Algorithm Design paradigms - Designing an algorithm And its analysis-Best, Worst and
Average case - Asymptotic notations Based on growth functions. O,O,Ө, ω, Ω - Mathematical analysis - Induction, Recurrence relations -Solution of recurrence relations - Substitution method - Solution of recurrence
relations - Recursion tree - Solution of recurrence relations - examples.
Unit-2 - Divide and Conquer 15 Hour
Maximum Subarray Problem Binary Search - Complexity of binary search Merge sort - Time complexity analysis -Quick sort and its Time complexity analysis Best case, Worst case, Average case analysis -
Strassen's Matrix multiplication and its recurrence relation - Time complexity analysis of Merge sort - Largest sub-array sum - Time complexity analysis of Largest sub- array sum - Master Theorem Proof - Master
theorem examples - Finding Maximum and Minimum in an array - Time complexity analysis-Examples - Algorithm for finding closest pair problem - Convex Hull problem
Unit-3 - Greedy and Dynamic Programming 15 Hour
- Examples of problems that can be solved by using greedy and dynamic approach Huffman coding using greedy approach Comparison of brute force and Huffman method of encoding - Knapsack problem using
greedy approach Complexity derivation of knapsack using greedy - Tree traversals - Minimum spanning tree – greedy Kruskal's algorithm - greedy - Minimum spanning tree - Prims algorithm Introduction to dynamic
programming - 0/1 knapsack problem - Complexity calculation of knapsack problem - Matrix chain multiplication using dynamic programming - Complexity of matrix chain multiplication - Longest common subsequence
using dynamic programming - Explanation of LCS with an example - Optimal binary search tree (OBST)using dynamic programming - Explanation of OBST with an example.

20
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Backtracking 15 Hour
branch and bound - N queen’s problem – backtracking - Sum of subsets using backtracking Complexity calculation of sum of subsets Graph introduction Hamiltonian circuit - backtracking - Branch and bound -
Knapsack problem Example and complexity calculation. Differentiate with dynamic and greedy Travelling salesman problem using branch and bound - Travelling salesman problem using branch and bound example
- Travelling salesman problem using branch and bound example - Time complexity calculation with an example - Graph algorithms - Depth first search and Breadth first search - Shortest path introduction - Floyd-
Warshall Introduction - Floyd-Warshall with sample graph - Floyd-Warshall complexity
Unit-5 - Randomized and Approximation Algorithm 15 Hour
Randomized hiring problem Randomized quick sort Complexity analysis String matching algorithm Examples - Rabin Karp algorithm for string matching Example discussion - Approximation algorithm - Vertex
covering - Introduction Complexity classes - P type problems - Introduction to NP type problems - Hamiltonian cycle problem - NP complete problem introduction - Satisfiability problem - NP hard problems – Examples
Lab Experiments
Lab 1: Simple Algorithm-Insertion sort Lab 9: Longest common subsequence
Lab 2: Bubble Sort Lab 10: N queen’s problem
Lab 3: Recurrence Type-Merge sort, Linear search Lab 11: Travelling salesman problem
Lab 4: Quicksort, Binary search Lab 12: BFS and DFS implementation with array
Lab 5: Strassen Matrix multiplication Lab 13: Randomized quick sort
Lab 6: Finding Maximum and Minimum in an array, Convex Hull problem Lab 14: String matching algorithms
Lab 7: Huffman coding, knapsack and using greedy Lab 15: Discussion over analyzing a real time problem
Lab 8: Various tree traversals,

1. Thomas H Cormen, Charles E Leiserson, Ronald L Revest, Clifford Stein, Introduction to 3. Ellis Horowitz, Sartajsahni, Sanguthevar, Rajesekaran, Fundamentals of Computer
Learning
Algorithms, 3rd ed., The MIT Press Cambridge, 2014 Algorithms, Galgotia Publication, 2010
Resources
2. Mark Allen Weiss, Data Structures and Algorithm Analysis in C, 2nd ed., Pearson Education, 2006 4. S. Sridhar, Design and Analysis of Algorithms, Oxford University Press, 2015

Learning Assessment
Continuous Learning Assessment (CLA)
Summative Final Examination
Bloom’s Formative CLA-1 Average of unit test Life-Long Learning CLA-2
(40% weightage)
Level of Thinking (45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - - 30% 30% -
Level 2 Understand 70% - - 30% 30% -
Level 3 Apply - - - 40% 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. G. Venkiteswaran, Wipro Technologies, [email protected] 1. Mitesh Khapra, IITM Chennai, [email protected] 1. Dr. K.Senthil Kumar, SRMIST
2. Dr. Sainarayanan Gopalakrishnan, HCL Technologies, [email protected] 2. V. Masilamani. IIITDM, [email protected] 2. Dr. V. Sivakumar, SRMIST
3. Dr. R. Vidhya,SRMIST

21
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC205P DATABASE MANAGEMENT SYSTEMS C PROFESSIONAL CORE
Code Name Category 3 1 0 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the fundamentals and need of Database systems, Architecture, Languages 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: conceive database design through Relational model, Relational Algebra

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


CLR-3: design Logical schema with constraints, Familiarize SQL Queries

Modern Tool Usage

Life Long Learning


complex problems
CLR-4: standardization of Database through Normalization

Problem Analysis

Communication
Environment &
understand Storage Management, the practical problems of Concurrency control, Failures and recovery,

Sustainability
CLR-5:
NoSQL database

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire knowledge on DBMS architecture and languages - 2 - - - - - - - - - - 2 1 -
CO-2: acquire knowledge on Relational languages and design a database 1 2 - - - - - - - - - - 2 1 -
CO-3: implement the Database structure with SQL 1 - 2 - - - - - - - - - 2 1 -
CO-4: removal of anomalies using Normalization concepts 1 - - - - - - - - - - - 2 1 -
CO-5: visualizing storage structure, handling concurrency, Failure and recovery principles, NoSQL concept 1 2 - - - - - - - - - - 2 1 -

Unit-1 - Introduction 12 Hour


Issues in File Processing System, Need for DBMS, Basic terminologies of Database, Database system Architecture, Various Data models, ER diagram basics and extensions, Case study: Construction of Database
design using Entity Relationship diagram for an application such as University Database, Banking System, Information System
Unit-2 - Relational DBMS 12 Hour
Conversion of ER model to Relational Table, Case study: Apply conversion concept. Discussion of various design issues. Pitfalls in Relational Database systems, Understanding various Relational languages such
as Tuple Relational calculus, Domain relational calculus, Calculus Vs Algebra, Computational capabilities. Case Study: Applying Relational Algebra for all the queries of application Designed.
Unit-3 – SQL 12 Hour
SQL commands, Constraints, Joins, set operations, Sub queries, Views, PL – SQL, Triggers, and Cursors. Case Study: Implement all the queries using SQL, PL-SQL, Cursor and Triggers
Unit-4 - Normalization 12 Hour
Normalization, Need for Normalization, NF1, NF2, NF3, NF4, NF5. Case study: Apply Conversion rules and normalize the Database
Unit-5 – Concurrency Control 12 Hour
Storage Structure, Transaction control, Concurrency control algorithms, Issues in Concurrent execution, Failures and Recovery algorithms Case study: Demonstration of Entire project by applying all the concepts
learnt with minimum Front end requirements, NoSQL Databases-Document Oriented, Key value pairs, Column Oriented and Graph

22
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, Database System Conceptsǁ, 4. RaghuramaKrishnan, Johannes Gehrke, Database Management Systems, 3rdEdition, McGrawHill
Seventh Edition, Tata McGraw Hill, 2019. Education, 2003.
Learning 2. Ramez Elmasri, Shamkant B. Navathe, Fundamentals of Database Systemsǁ, Sixth 5. Principles of Database Systems, J.D. Ullman, Galgoti,1982
Resources Edition, Pearson Education, 2011. 6. NoSQL Distilled, A brief guide to the emerging world of Polygot persistence, First Edition,Promod
3. CJ Date, A Kannan, S Swamynathan, An Introduction to Database Systems, Eight J,Sadalage Martin Fowler,2012
Edition, Pearson Education, 2006.

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Project Based Learning Report and Viva Voce Final Examination
Bloom’s
CLA-1 Average of unit test CLA-2 (20% weightage) (0% weightage)
Level of Thinking
(20%) (60%)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - - - - - -
Level 2 Understand 40% - - - - - - -
Level 3 Apply 40% - - 30% - - - -
Level 4 Analyze - - - 30% - - - -
Level 5 Evaluate - - - - - 50% - -
Level 6 Create - - - 40% - 50% - -
Total 100 % 100 % 100% -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms.Sangeetha Jayaprakash, Database Architect, BOSCH India 1. Dr.J.Sheeba Rani, Indian Institute of Space Science and Technology, 1. Dr.M.Thenmozhi,SRMIST
Trivandrum
2. Dr.Manipoonchelvi, Senior Technical Manager, HCL 2. Dr.K.Nandhini, Central University of Thiruvarur 2. Ms.K.Srividya, SRMIST
Technologies

23
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC301T FORMAL LANGUAGE AND AUTOMATA C PROFESSIONAL CORE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: construct automata for any equivalent regular expressions 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquire brief knowledge about automata languages

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: analyze about context free grammars and its implementation in Push down automata

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: interpret the power of Turing machine and the decidable nature of a problem

Environment &
Sustainability
CLR-5: categorize undecidable problems and NP class problems

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: summarize the basic concepts of deterministic and non-deterministic finite automata and its applications - 1 1 - - - - - - - - - 1 3 -
CO-2: analyze the formal relationships among machines, languages and Context free grammars and its normalization - 3 3 - - - - - - - - - 1 3 -
CO-3: construct the Push down stack machine and its context free language acceptance and its equivalence with CFG - 2 2 - - - - - - - - - 1 3 -
CO-4: analyze the techniques for Turing machine construction and its recursive languages and functions - 2 2 - - - - - - - - - 1 3 -
CO-5: evaluate the computational complexity of various problems - 3 3 - - - - - - - - - 1 3 -

Unit-1 - Finite Automata and Regular Expressions 9 Hour


Deterministic and Non-Deterministic Finite Automata, Finite Automata with ε-moves, regular expressions – equivalence of NFA and DFA, two-way finite automata, Moore and Mealy machines, Equivalence of Moore
and Mealy machines, applications of finite automata.
Unit-2 - Regular Sets and Context Free Grammars 9 Hour
Properties of regular sets, context-Free Grammars, and Languages – derivation trees, Simplification of CFG: Elimination of Useless Symbols Simplification of CFG: Unit productions, Null productions - Chomsky
Normal Forms and Greibach Normal Forms, ambiguous and unambiguous grammars; minimization of finite automata
Unit-3 - Pushdown Automata and Parsing Algorithms 9 Hour
Deterministic Push Down Automata – Non-Deterministic Push Down Automata – Equivalence of Pushdown Automata and context-free languages; Properties of CFL; Applications of pumping lemma –– closure
properties of CFL and decision algorithms; Overview of Top-down parsing and Bottom-up parsing
Unit-4 - Turing Machines 9 Hour
Turing machines (TM) – computable languages and functions – tuning machine constructions – storage in finite control – variations of TMs – Church-Turing thesis – Universal Turing machine– recursive and
recursively enumerable languages
Unit-5 - Introduction to Computational Complexity 9 Hour
Time and Space complexity of TMs – complexity classes – introduction to NP-Hardness and NP-Completeness Post Correspondence Problems (PCP) – Modified PCP – Halting Problems – Undecidability Problems

1. Hopcroft J.E., Motwani R. and Ullman J.D, “Introduction to Automata Theory, 3. John.C. Martin, “Introduction to Languages and the Theory of Computation” McGraw-Hill Education,
Learning
Languages and Computations”, Second Edition, Pearson Education, 2008. 01- May-2010.
Resources
2. Michael Sipser, “Introduction to the Theory of Computation” Cengage Learning, 2012 4. Peter Linz,“An introduction to formal languages and automata”,Jones & Bartlett Learning,6th ed 2017
24
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Santhosh Muniswami, Cisco Systems, Inc. 1. Dr. P. Victer Paul, Indian Institute of Information Technology Kottayam 1. Dr. N. Arunachalam,SRMIST
2. B. Divya, TCS 2. Dr.C. Punitha Devi, Pondicherry University, 2. Dr. K. Vijaya,SRMIST

25
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC302J COMPUTER NETWORKS C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: define the layered network architecture 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: produce knowledge in IP addressing

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: identify suitable routing algorithms based on geographical location of the devices

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: apply the concept of Error detection to identify the errors in data

Environment &
Sustainability
CLR-5: exploring reliable and unreliable protocols

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the knowledge of communication 3 - - - 3 - - - - - - - 1 - -
CO-2: construct the network using addressing schemes 3 - - 2 - - - - - - - - 1 - -
CO-3: design and implement the various Routing Protocols 3 - - 2 3 - - - - - - - 1 - -
CO-4: identify and correct the errors in transmission 3 - - - - - - - - - - - 1 - -
CO-5: analyze the services provided by Transport and Application layers 3 - - - - - - - - - - - 1 - -

Unit-1 - Introduction to Networks 15 Hour


Network Types: LAN, MAN, PAN, WAN - Network Topology : BUS, STAR, RING, MESH, HYBRID - Switching : Circuit Switching, Packet Switching - OSI Layered Architecture - TCP/IP Model - Physical Layer
Overview - Latency, Bandwidth, Delay - Guided Media : Twisted pair, Coaxial cable, Fiber optic cable - Unguided Media : Radio waves, Microwaves, Infrared.
Lab 1: Introduction to Packet Tracer, Peer to Peer communication, study of cables and its colour codes
Lab 2: Implementation of Network Topologies
Lab 3: Router Configuration (Creating Passwords, Configuring Interfaces)
Unit-2 - Addressing 15 Hour
IPV4 Addressing - Address space - Classful addressing - Subnet mask - FLSM - Classless Addressing - VLSM – NAT – Super netting - Network Devices: Hub, Repeaters, Switch, Bridge, Router
Lab 4: IP addressing and Sub netting (VLSM)
Lab 5: Static and Default Routing
Lab 6: NAT Configuration
Unit-3 - Routing 15 Hour
Forwarding of IP Packets — Static and Default Routing — Unicast Routing Algorithms: Distance Vector Routing, Link State Routing, Path Vector Routing — Protocols: RIP V1, RIP V2, OSPF, BGP, EIGRP —
Multicasting Basics — IPV6 Addressing Basics
Lab 7: Implementation of RIP version 1
Lab 8: Implementation of RIP version 2
Lab 9: Implementation of Single Area OSPF

26
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 – Medium Access Control 15 Hour
ALOHA ,CSMA/CD, CSMA/CA, Ethernet, Token Ring - Flow Control :Stop and Wait, Sliding Window - Error Control: Stop and Wait ARQ, Sliding Window ARQ - Error Detection : Parity Check, Checksum, CRC -
Error Correction: Hamming codes - Data-Link Layer Protocols : HDLC, PPP.
Lab 10: Implementation of Multi Area OSPF
Lab 11: PPP Configuration
Lab 12: HDLC Configuration
Unit-5 – Transport and Application Layer Protocols 15 Hour
Port Numbers — User Datagram Protocol — Transmission Control Protocol — WWW and HTTP — FTP — Email –Telnet – DNS.
Lab 13: Implementation of BGP
Lab 14: Implementation of EIGRP
Lab 15: Telnet Configuration

Learning 1. Behrouz A. Forouzan, "Data Communication and Networking",5th ed.,2010 3. William Stallings, " Data and Computer Communications",9th ed.,2010
Resources 2. Bhushan Trivedi, " Data Communication and Networks" 2016 4. Todd Lammle, "CCNA Study Guide",7th ed.,2011

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - 20% 20% -
Level 2 Understand 40% - - 40% 40% -
Level 3 Apply 40% - - 40% 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Srinivasan Varadharajan, Senior Principal Software 1. Dr. I.Joe Louis Paul, Associate Professor, SSN College of 1. Dr. S. Metilda Florence, SRMIST
Engineer, Manhattan Associates, Atlanta, United States Engineering, TamilNadu

27
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC303J SOFTWARE ENGINEERING AND PROJECT MANAGEMENT C PROFESSIONAL CORE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: familiarize the software life cycle models and software development process 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate the various techniques for requirements, planning and managing a technology project

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: examine basic methodologies for software design, development, testing, and implementation

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand manage user’s expectations and the software development team

Environment &
Sustainability
CLR-5: apply the project management and analysis principles to software project development

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify the process of project life cycle model and process - - - - - - - - 2 - 2 - 3 - -
CO-2: analyze and translate end-user requirements into system and software requirements - 3 - - - - - - 2 - 2 - 3 - -
CO-3: identify and apply appropriate software architectures and patterns to carry out high level design of a system - - 2 - - - - - 2 - 2 - 3 - -
CO-4: develop Test plans and incorporate suitable testing strategies - - - - - - - - 2 - 2 - 3 - -
CO-5: examine the risk strategies and maintenance measures - - - - - - - - 2 - 3 - 3 - -

Unit-1 - Introduction to Software Engineering 12 Hour


The evolving role of software, changing nature of software, Generic view of process: Software engineering- a layered technology, a process framework, Software Project Management - life cycle activities, Process
models: The waterfall model, incremental process models, evolutionary process models, the unified process, Conventional- Agile, XP, Scrum, Project Initiation management – Project Charter, Project Scope, Project
Objectives, Practical considerations.
Unit-2 - Software Requirements 12 Hour
Functional and non-functional requirements, user requirements, system requirements, interface specification, the software requirements document. Requirements engineering process: Feasibility studies,
requirements elicitation and analysis, requirements validation, requirements management, Software project effort and cost estimation – Cocomo model I, Cocomo Model II, LOC, Function point metrics
Unit-3 - Software Design 12 Hour
Software Design Fundamentals, Design process – Design Concepts-Design Model– Design Heuristic , Design techniques– Architectural Design - Architectural styles, Creating an architectural design- software
architecture, data design, architectural styles and patterns, architectural design, conceptual model of UML, basic structural modeling, class diagrams, sequence diagrams, collaboration diagrams, use case diagrams,
component diagrams, Design of User Interface design Elements of good design, Design issues Features of modern GUI - Menus, Scroll bars, windows, Buttons, icons, panels, error Messages etc.
Unit-4 - Software Construction 12 Hour
Coding Standards, Coding Frameworks. Reviews: Deskchecks, Walkthroughs, Code Reviews, Inspections, Coding Methods, Testing Strategies: A strategic approach to software testing, test strategies for
conventional software, black-box and white-box testing, validation testing, system testing, Unit Testing – Integration Testing – Validation Testing – System Testing and Debugging
Unit-5 – Product Management 12 Hour
Product Release Management, Risk management: Reactive Vs proactive risk strategies, software risks, risk identification, risk projection, risk refinement, RMMM, RMMM plan, Maintenance and Reengineering

28
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Lab Experiments
Lab 1: Identify the Software Project, Create Business Case, Arrive at a Problem Statement
Lab 2: Analyse Stakeholder and User Description and Identify the appropriate Process Model
Lab 3: Identify the Requirements, System Requirements, Functional Requirements, Non-Functional Requirements and develop a SRS Document
Lab 4: Prepare Project Plan based on scope, Find Job roles and responsibilities, Calculate Project effort based on resources
Lab 5: Prepare the Work, Breakdown Structure based on timelines, Risk Identification and Plan
Lab 6: Design a System Architecture, Use Case Diagram, ER Diagram (Database)
Lab 7: DFD Diagram (process) (Upto Level 1), Class Diagram (Applied For OOPS based Project),
Lab 8: Interaction Diagrams, State chart and Activity Diagrams
Lab 9: State and Sequence Diagram, Deployment Diagram,
Lab 10: Sample Frontend Design (UI/UX)
Lab 11: Sample code implementation
Lab 12: Master Test Plan, Test Case Design (Phase 1
Lab 13: Manual Testing
Lab 14: User Manual, Analysis of Costing, Effort and Resource
Lab 15: Project Demo and Report Submission with the team

1. Roger S. Pressman, Software Engineering – A Practitioner Approach, 6th ed., 4. Ramesh, Gopalaswamy, Managing Global Projects, Tata McGraw Hill, 2005
McGraw Hill, 2005 5. Ashfaque Ahmed, Software Project Management: a process-driven approach, Boca Raton, Fla: CRC Press,
Learning
2. Ian Sommerville, Software Engineering, 8th ed., Pearson Education, 2010 2012
Resources
3. Rajib Mall, Fundamentals of Software Engineering, 4th ed., PHI Learning 6. Walker Royce, Software Project Management, Pearson Education, 1999
Private Limited, 2014 7. Jim Smith Agile Project Management: Creating Innovative Products,Pearson 2008

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - 20% 20% -
Level 2 Understand 20% - - 20% 20% -
Level 3 Apply 40% - - 40% 40% -
Level 4 Analyze 20% - - 20% 20% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. DHINAKAR JACOB SELWYN, CAP GEMINI TECHNNOLOGY 1. Mrs. Anupama C G,SRMIST
2. Mr. Girish Raghavan, Wipro Technologies

29
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC304J COMPILER DESIGN C PROFESSIONAL CORE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline the implementation of Lexical Analyzer 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: learn the various parsing techniques

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: familiarize the intermediate code generation and run-time environment

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn the implementation of code generator

Environment &
Sustainability
CLR-5: identify the various methods for Code Optimizer

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire knowledge of Lexical Analyzer from a specification of a language's lexical rules 3 2 - - 2 - - - - - - - - 1 -
CO-2: apply different parsing algorithms to develop the parsers for a given grammar 3 3 - - 2 - - - - - - - - 1 -
CO-3: gain knowledge to translate a system into various intermediate codes 3 2 - - 2 - - - - - - - - 1 -
CO-4: analyze the methods of implementing a Code Generator for compilers 3 2 - 3 - - - - - - - - - 1 -
CO-5: design the methods of developing a Code Optimizer 3 - 2 3 - - - - - - - - - 1 -

Unit-1 - Introduction 12 Hour


Compilers-Phases of Compiler-Cousins of the Compiler-Grouping of Phases-Compiler construction tools- Lexical Analysis-Role of Lexical Analyzer-Input Buffering -Specification of Tokens -LEX -Finite Automata-
Regular Expressions to Automata -Minimizing DFA.
Unit-2 – Top Down Parsing 12 Hour
Role of Parser-Grammars-Error Handling-Context-Free Grammars-Writing a grammar- Elimination of Ambiguity-Left Recursion- Left Factoring-Top Down Parsing — Recursive Descent Parser- Predictive Parser-
LL(1) Parser- Computation of FIRST-Computation of FOLLOW-Construction of a predictive parsing table-Predictive Parsers LL(1) Grammars- Predictive Parsing Algorithm- Problems related to Predictive Parser -
Error Recovery in Predictive Parsing-.
Unit-3 – Bottom-Up Parsing 12 Hour
Bottom Up Parsing-Reductions-Handle Pruning-Shift Reduce Parser-Problems related to Shift Reduce Parsing-Operator Precedence Parser, LEADING, TRAILING -LR Parser- LR Parsers- Need of LR Parsers-LR
(0)Item-Closure of Item Sets- Construction of SLR Parsing Table -Problems related to SLR-Construction of Canonical LR(1)- Problems related to CLR - LALR Parser — Problems related to LALR-YACC.
Unit-4 – Code Generation 12 Hour
Intermediate Code Generation- prefix – postfix notation- Quadruple - triple - indirect triples Representation- Syntax tree- Evaluation of expression - Three-address code- Synthesized attributes – Inherited attributes
- Intermediate languages – Declarations- Assignment Statements- Boolean Expressions- Case Statements- Back patching – Procedure calls- Code Generation- Issues in the design of code generator- The target
machine – Runtime Storage management- A simple Code generator- Code Generation Algorithm- Register and Address Descriptors.
Unit-5 – Code Optimization 12 Hour
Code optimization -Principal Sources of Optimization- Function Preserving Transformation- Loop Optimization- Peephole optimization — DAG- Basic Blocks- Flow Graphs- Global Data Flow Analysis — Efficient
Data Flow Algorithm- Runtime Environments- Source Language issues- Storage Organization- Activation Records- Storage Allocation strategies.

30
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Lab Experiments
Lab 1 - Implementation of Lexical Analyzer Lab 9 Computation of LR (0) items
Lab 2 conversion from Regular Expression to NFA Lab 10-Intermediate code generation – Postfix, Prefix
Lab 3 Conversion from NFA to DFA Lab 11 Intermediate code generation – Quadruple, Triple, Indirect triple
Lab 4 Elimation of Ambiguity, Left Recursion and Left Factoring Lab 12: A simple code Generator
Lab 5 -FIRST AND FOLLOW computation Lab 13 Implementation of DAG
Lab 6 Predictive Parsing Table Lab 14: Implementation of Global Data Flow Analysis
Lab 7 - Shift Reduce Parsing Lab 15: Implement any one storage allocation strategies (heap, stack, static)
Lab 8- Computation of LEADING AND TRAILING

1. Alfred V. Aho, Monica S. Lam, Ravi Sethi, Jeffrey D. Ullman, Compilers: Principles, Techniques 4. David Galles, “Modern Compiler Design”, Pearson Education, Reprit 2012.
Learning and Tools, Second Edition, Pearson Education, 2011. 5. Raghavan V., “Principles of CompilerDesign”, Tata McGraw Hill Education Pvt. Ltd.,
Resources 2. S. Godfrey Winster, S. Aruna Devi, R.Sujatha,”Compiler Design”, Yesdee Publishing Pvt.Ltd, 2016. 2010.
3. K .Muneeswaran,”CompilerDesign”, Oxford Higher Education, Fourth Edition, 2015.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Saranya Baskar, Lead Software Testing Engineer, EPAM 1. Dr. E. Ilavarasan, Professor, Department of Computer Science 1. Dr. M. Baskar, SRMIST
Systems India Private Limited, Hyderabad. and Engineering, Puducherry Technological University,
[email protected] Puducherry.
2. Dr. M. Shyamala Devi, Professor, Department of Computer 2. Dr. Godfrey Winster S SRMIST
Science and Engineering, Vel Tech Rangarajan Dr. Sagunthala R
& D Institute of Science and Technology, Chennai.

31
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC305P MACHINE LEARNING C PROFESSIONAL CORE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: explore the fundamental mathematical concepts of machine learning algorithms 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: apply linear machine learning model to perform regression and classification

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: utilize mixture models to group similar data items

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: develop machine learning models for time –series data prediction

Environment &
Sustainability
CLR-5: design ensemble learning models using various machine learning algorithms

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the basics of machine learning using probability theory - 2 - - - - - - - - - - 1 - -
CO-2: implement machine learning models using supervised learning algorithms - 2 - 2 - - - - - - - - - - 2
CO-3: implement machine learning models using unsupervised learning algorithms - 3 - 3 - - - - - - - - - - 2
CO-4: implement machine learning models for sequential data analysis and prediction - 3 - 3 - - - - - - - - - - 3
CO-5: develop ensemble learning models for supervised and unsupervised learning - 3 3 - - - - - - - - - - 3

Unit-1 - Introduction 9 Hour


machine learning what and why?, supervised and unsupervised learning, polynomial curve fitting, probability theory- discrete random variables, fundamental rules,Bayes rule, Independence and conditional
independence, continuous random variables, Quantiles, Mean and variance, probability densities, Expectation and covariance.
Practice:
1. Devise a program to import, load and view dataset
2. Create a program to display the summary and statistics of the dataset
Unit-2 - Linear models for Regression 9 Hour
Maximum likelihood estimation – least squares, robust linear expression, ridge regression, Bayesian linear regression. Linear models for classification: Discriminant function – Probabilistic generative models,
Probabilistic discriminative models, Laplacian approximation, Bayesian logistic regression, Kernels functions, using kernels in GLMs, Kernel trick, SVMs.
Practice:
1. Implement linear regression to perform prediction
2. Implement Bayesian logistic regression and SVM for classification
Unit-3 - Mixture Models and EM 9 Hour
K-means clustering, mixtures of Gaussians, An alternative view of EM, Factor analysis, PCA, choosing the number of latent dimensions. Clustering – measuring dissimilarity, evaluating the output of clustering
methods, Hierarchical clustering.
Practice:
1. Implement K-means clustering, mixtures of Gaussians and Hierarchical clustering algorithm to categorize data.
2. Create a program to perform PCA
32
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 – Hidden Markov Models 9 Hour
Sequential data – Markov models, HMM – maximum likelihood for the HMM, The forward and Backward algorithm, the sum-product algorithm, scaling factors, Viterbi algorithm, linear dynamical systems.
Practice:
1. Implement HMM to predict the sequential data
Unit-5 – Combining Models 9 Hour
Bayesian model averaging, Boosting, Adaptive basis function models, CART, generalized additive models, Ensemble learning.
Practice:
1. Implement CART learning algorithms to perform categorization
2. Implement Ensemble learning models to perform classification

Learning
1. Pattern Recognition and Machine Learning, Christopher M Bishop, Springer, 2006. 2. Machine Learning- A probabilistic perspective, Kevin P.Murphy, The MIT Press, 2012.
Resources

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Project Based Learning Report and Viva Voce Final Examination
Bloom’s
CLA-1 Average of unit test CLA-2 (20% weightage) (0% weightage)
Level of Thinking
(20%) (60%)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% - 15% - -
Level 2 Understand 25% - - 20% - 20% - -
Level 3 Apply 30% - - 25% - 25% - -
Level 4 Analyze 30% - - 25% - 25% - -
Level 5 Evaluate - - - 10% - 10% - -
Level 6 Create - - - 5% - 5% - -
Total 100 % 100 % 100 % -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Vaisakh. P.S, Assistant executive manager, Samsung 1. Dr.C.Oswald, Assistanrt professor, NIT, 1. A.Jackulin Mahariba, SRMIST
Electronics, Bangalore [email protected] Trichy,[email protected]

33
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

UNDERGRADUATE/ INTEGRATED POST


GRADUATE DEGREE PROGRAMMES
(With exit option of Diploma)

(Choice Based Flexible Credit System)

Regulations 2021

Volume – 11A
(Syllabi for CSE Programme Courses)

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

34
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Elective Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

35
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE251T DIGITAL IMAGE PROCESSING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline the fundamentals of various image processing concepts 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: familiarize on multiple image enhancement techniques and methodologies

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: learn different image segmentation methodologies

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn the art of on feature extraction and compression

Environment &
Sustainability
CLR-5: master various Deep learning algorithms for Image processing

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply various Fundamental techniques and methodologies image processing systems 3 2 - - - - - - - - - - - - -
CO-2: apply the image quality through different image enhancement algorithms 3 2 - - - - - - - - - - - - -
CO-3: gain knowledge on image segmentation algorithms 3 - 2 3 - - - - - - - - 2 - -
CO-4: apply feature extraction and compression models 3 - 3 3 - - - - - - - - 2 - -
CO-5: apply Deep learning principles for image processing 3 3 - - - - - - - - - - - 3 -

Unit-1 - Fundamentals of Digital Image Processing 9 Hour


Steps in Digital Image Processing – Components – Elements of Visual Perception – Image Sensing and Acquisition – Image Sampling and Quantization. Relationships between pixels - Color image fundamentals -
RGB, HSI models, Two-dimensional mathematical preliminaries, 2D transforms - DFT, DCT.
Unit-2 - Image Enhancement (Spatial and Frequency Domain) 9 Hour
Spatial Domain: Basic relationship between pixels- Basic Gray level Transformations – Histogram Processing – Smoothing spatial filters- Sharpening spatial filters. Frequency Domain: Smoothing frequency domain
filters- sharpening frequency domain filters Homomorphic filtering.
Unit-3 - Image Restoration Techniques 9 Hour
Introduction to Image Restoration- degradation model, Properties, Noise models – Mean Filters – Order Statistics – Adaptive filters – Band reject Filters – Band pass Filters – Notch Filters – Optimum Notch Filtering
– Inverse Filtering – Wiener filtering
Unit-4 - Concepts on Image Segmentation 9 Hour
Region of interest (ROI) selection - Feature extraction: Histogram based features - Intensity Features-Color, Shape Features-Local Binary Patterns (LBP), Texture descriptors- Grey Level Occurrence Matrix (GLCM).
Fundamentals of Image Compression models – Error Free Compression – Variable Length Coding –Bit – Plane Coding – Lossless Predictive Coding – Lossy Compression – Lossy Predictive Coding.
Unit-5 - Feature Extraction 9 Hour
Extracting Interest Points and Their Descriptors (with Harris, SIFT and SURF) in Image Pairs, Principal Component Analysis (PCA) and Linear Discriminant Analysis for Image Recognition- Image Classification
using SVM-ANN- Feedforward and Back propagation-Object Detection using CNN-RCNN.

36
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Rafael C. Gonzales, Richard E. Woods, “Digital Image Processing”, Pearson Education, 4. Kumar, “Digital Image Processing”, Tata McGraw Hill Pvt. Ltd., Second Reprint, 2010.
Third Edition, 2010. 5. Bhabatosh Chanda, Dwejesh Dutta Majumder, “Digital Image Processing and analysis”, PHI
Learning
2. S. Sridhar, “Digital Image Processing”, Second Edition, Oxford University, 2016. Learning Pvt. Ltd., Second Edition, 2011.
Resources
3. Anil Jain K. “Fundamentals of Digital Image Processing”, PHI Learning Pvt. Ltd., 2011. 3. 6. Malay K.Pakhira, “Digital Image Processing and Pattern Recognition”, PHI Learning Pvt.
Jayaraman S., Esaki Rajan S., T.Veera Ltd., First Edition, 2011.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 40% - 30% - 30% -
Level 3 Apply 30% - 50% - 50% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. SheebaBackiamary Huawei, Sweden. 1. Dr.Venningstun NIT, J&K, India [email protected] 1. Dr.Kottilingam, SRMIST
[email protected]
2. Dr. Gopal, Ceri, CHENNAI [email protected] 2. Dr. Jayashree P, Anna University, India [email protected] 2. Dr.Arivazhagan, SRMIST

37
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE252T BIOMETRICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic concept of biometrics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: gain knowledge on the basics of biometric traits, sensors, data acquisition and finger print process

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: introduce the process of Multibiometric system

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: acquire knowledge on biometric system authentication

Environment &
Sustainability
CLR-5: understand the real time application of biometrics

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the knowledge on basics of biometric traits 3 - - - - - - - - - - - - 2 -
CO-2: ability to identify pattern recognition system and its features 3 - - - - - - - - - - - - 2 -
CO-3: understand about multi model biometric traits 3 - - - - - - - - - - - - 1 -
CO-4: apply the knowledge of biometrics on developing authentication system 3 - 1 2 - - - - - - - - - 1 -
CO-5: apply the knowledge for designing biometric systems 3 - - 1 - - - - 2 - - - - 1 -

Unit-1 - Introduction 9 Hour


Basics of biometric systems, Biometric functionalities: verification, identification- Introduction to unimodal system, Introduction to multimodal system, what is image, acquisition, type, point operations, Geometric
transformations-First and Second Derivatives- steps in edge detection, smoothening, enhancement, thresholding, localization, Low level feature extraction, Describing image motion- High level feature extraction,
Template matching
Unit-2 - Process of Biometric System 9 Hour
Biometrics Sensors, Data Acquisition and Database, Biometrics Pre-processing Techniques-Image restoration and segmentation, Pattern Extraction and Classification, Fingerprint Identification Technology-
Fingerprint Patterns, Fingerprint Features, Fingerprint Image, width between two ridges -Fingerprint Image Processing – Minutiae Determination – Fingerprint Matching: Fingerprint Classification, Matching policies.
Unit-3 - Multibiometric System 9 Hour
Introduction to Multibiometric – Information Fusion in Biometrics – Issues in Designing a Multibiometric System – Sources of Multiple Evidence – Levels of Fusion in Biometrics – Sensor level, Feature level, Rank
level, Decision level fusion – Score level Fusion. Introduction to various matching methods – LDA, PCA, Eigen Vectors and Values-Covariance, Correlation- Introduction to decision theory and their examples
Unit-4 - Authentication Procedure 9 Hour
physiological and behavioral properties of biometric system, Software biometrics systems, Hardware biometrics systems, Security of biometric systems- Advisory,insider,infrastructure attacks- Attacks at the user
interface- impersonation ,obfuscation, spoofing Attacks on system module and interconnections- Counter measure: Biometric template security- Challenges in biometric systems like fool proofing, false positives
Unit-5 - Applications 9 Hour
access control like a lock or an airport check-in area- immigration and naturalization- welfare distribution- military application- banking, e.g., check cashing, credit card, ATM- computer login; intruder detection; smart
card- multi-media Communication; WWW and an electronic purse- sensor fusion; decision fusion- categorization: e.g., age and gender- industrial automation - efficient enrollment gesture interpretation; on-line
shopping- other commercialized service: Fingerprint, Face detection, Irish Recognition.

38
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. James Wayman, Anil Jain, DavideMaltoni, Dario Maio, Biometric Systems, 4. Digital Image Processing using MATLAB, By: Rafael C. Gonzalez, Richard Eugene Woods, 2nd
Technology Design and Performance Evaluation, Springer, 2005. Edition, Tata McGraw-Hill Education 2019
Learning 2. James wayman, Anilk.Jain, ArunA.Ross, Karthik Nandakumar, ―Introduction to. 5. Guide to Biometrics, By: Ruud M. Bolle, SharathPankanti, Nalini K. Ratha, Andrew W. Senior, Jonathan
Resources Biometricsǁ, Springer, 2011 H. Connell, Springer 2009
3. Mark S.Nixon, Alberto S.Aguado, Feature Extraction and image processing for 6. Pattern Classification, By: Richard O. Duda, David G.Stork, Peter E. Hart, Wiley 2007
computer vision, Third Edition, , Elsevier 2012 7. Shimon K.Modi , ―Biometrics in Identity Management :concepts to applicationsǁ, Artech House 2011

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 30% - 30% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 20% - 30% - 30% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.L.Parthiban, Exceillity Technologies 1. Dr.S.P.Raja, Associate Professor, VIT, Vellore, 1. Dr.E.Poongothai, SRMIST

39
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE253T INTERNET OF THINGS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand Smart Objects and IoT Architectures 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: learn about various IOT-related protocols

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: build simple IoT Systems using Arduino and Raspberry Pi

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand data analytics and cloud in the context of IoT

Environment &
Sustainability
CLR-5: develop IoT infrastructure for popular applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: explain the concept of IoT 1 - - - - 2 - - - - - - - - 2
CO-2: analyze various protocols for IoT - 1 - - - - - - - - - - - - 2
CO-3: design a PoC of an IoT system using Rasperry Pi/Arduino 2 - 1 - - - - - - - - - - - 2
CO-4: apply data analytics and use cloud offerings related to IoT - 3 - - 1 - - - - - - - - - 2
CO-5: analyze applications of IoT in real time scenario - 1 - 3 - - - - - - - - - - 2

Unit-1 - Fundamentals of IoT 9 Hour


Evolution of Internet of Things - Enabling Technologies – IoT Architectures: oneM2M, IoT World Forum (IoTWF) and Alternative IoT models – Simplified IoT Architecture and Core IoT Functional Stack -– Fog, Edge,
and Cloud in IoT – Functional blocks of an IoT ecosystem – Sensors, Actuators, Smart Objects and Connecting Smart Objects
Unit-2 - IoT Protocols 9 Hour
IoT Access Technologies: Physical and MAC layers, topology, and Security of IEEE 802.15.4, 802.15.4g, 802.15.4e, 1901.2a, 802.11ah and LoRaWAN – Network Layer: IP versions, Constrained Nodes and
Constrained Networks – Optimizing IP for IoT: From 6LoWPAN to 6Lo, Routing over Low Power and Lossy Networks – Application Transport Methods: Supervisory Control and Data Acquisition – Application Layer
Protocols: CoAP and MQTT
Unit-3 - Design and Development 9 Hour
Design Methodology - Embedded computing logic - Microcontroller, System on Chips - IoT system building blocks - Arduino - Board details, IDE programming - Raspberry Pi - Interfaces and Raspberry Pi with
Python Programming.
Unit-4 - Data Analytics and Supporting Services 9 Hour
Structured Vs Unstructured Data and Data in Motion Vs Data in Rest – Role of Machine Learning – No SQL Databases – Hadoop Ecosystem – Apache Kafka, Apache Spark – Edge Streaming Analytics and Network
Analytics – Xively Cloud for IoT, Python Web Application Framework – Django – AWS for IoT – System Management with NETCONF-YANG
Unit-5 - Case Studies/Industrial Applications 9 Hour
Cisco IoT system - IBM Watson IoT platform – Manufacturing - Converged Plantwide Ethernet Model (CPwE) – Power Utility Industry – GridBlocks Reference Model - Smart and Connected Cities: Layered
architecture, Smart Lighting, Smart Parking Architecture and Smart Traffic Control

40
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Rob Barton and Jerome Henry, 4. An Ho¨ ller, VlasiosTsiatsis, Catherine Mulligan, Stamatis, Karnouskos, Stefan Avesand. David
―IoT Fundamentals: Networking Technologies, Protocols and Use Cases for Internet Boyle, "From Machine-to-Machine to the Internet of Things - Introduction to a New Age of
of Things, Cisco Press, 2017 Intelligence", Elsevier, 2014.
Learning
2. ArshdeepBahga, Vijay Madisetti, ―Internet of Things – A hands-on approachǁ, 5. Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds), ―Architecting the Internet of
Resources
Universities Press, 2015 Thingsǁ, Springer, 2011.
3. Olivier Hersent, David Boswarthick, Omar Elloumi , ―The Internet of Things – Key 6. Michael Margolis, Arduino Cookbook, Recipes to Begin, Expand, and Enhance Your Projects, 2nd
applications and Protocolsǁ, Wiley, 2012 (for Unit 2). Edition, O'Reilly Media, 2011.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Shreyas Lakshminarayanan, Systems Engineer Tata Consultancy 1. Dr. G.R. Sakthidharan, Professor/GRIET, Hyderabad 1. M. Arulprakash, SRMIST
Services Pvt Ltd, Chennai
2. Shaishav Tayde, IT Analyst Tata Consultancy Services Pvt Ltd, 2. Dr. Arunraj, Associate Prof./Crescent University, Chennai 2. J. Ramapraba, SRMIST
Ahmedabad

41
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE254T BIO INSPIRED COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basics of biological systems 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquire knowledge on working of Evolutionary algorithms

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gain the knowledge on the fundamentals and topological working of Artificial Neural Networks

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: conceive the the fundamentals and working of Swarm Intelligence

Environment &
Sustainability
CLR-5: explore the working of Immuno Computing Techniques

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: exhibit knowledge on fundamental concepts of bio inspired computing 3 2 - 2 - - - - - - - - - 3 2
CO-2: apply evolutionary algorithms and perform computing 2 2 - - - - - - - - - - - 3 2
CO-3: design and develop simple neural network models 3 - 3 2 - - - - - - - - - 3 2
CO-4: recommend appropriate swarm algorithm for building an AI model 2 2 2 - - - - - - - - - - 3 2
CO-5: apply suitable Immuno Computing algorithm for a given problem 2 - 2 - - - - - - - - - - 3 2

Unit-1 - Introduction 9 Hour


Models of Life and Intelligence - Fundamentals of bio-inspired models and bio-inspired computing. Evolutionary models and techniques, Swarm models and its self-Organization, swarm, and evolutionary algorithms.
Optimization problems – single and multi-objective optimization, heuristic, meta-heuristic, and hyper heuristic functions
Unit-2 - Evolutionary Computing 9 Hour
Evolutionary Computing, Hill Climbing and Simulated Annealing, Darwin's Dangerous Idea, Genetics Principles, Standard Evolutionary Algorithm -Genetic Algorithms, Reproduction-Crossover, Mutation, Evolutionary
Programming, Genetic Programming
Unit-3 - Neural Models 9 Hour
Biological nervous systems, artificial neural networks, evolution of neural networks,neuron models, architecture, unsupervised learning, supervised learning, reinforcement learning,Linear separability problem,signal
encoding, synaptic plasticity, hybrid neural systems
Unit-4 - Swarm Intelligence 9 Hour
Introduction - Ant Colonies, Ant Foraging Behavior, Ant Colony Optimization, SACO, and scope of ACO algorithms, Ant Colony Algorithm (ACA), Swarm Robotics, Foraging for food, Social Adaptation of Knowledge,
Particle Swarm Optimization (PSO)
Unit-5 - Immuno Computing Systems 9 Hour
Introduction- Immune System, Physiology and main components, Pattern Recognition and Binding, biological immune systems, lessons for artificial immune systems, algorithms and applications, shape space,
negative selection algorithm, clonal selection algorithm, Bone Marrow Models, Forest's Algorithm

42
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Leandro Nunes de Castro - " Fundamentals of Natural Computing, Basic Concepts, 4. Marco Dorrigo, Thomas Stutzle -” Ant Colony Optimization”, Prentice Hall of India, New Delhi, 2005
Algorithms and Applications", Chapman & Hall/ CRC, Taylor, and Francis Group, 2007 5. D. E. Goldberg, “Genetic algorithms in search, optimization, and machine learning”, Addison-
Learning 2. Floreano, D. and C. Mattiussi -"Bio-Inspired Artificial Intelligence: Theoriesethods, and Wesley, 1989.
Resources Technologies"IT Press, 2008 6. Simon O. Haykin, “Neural Networks and Learning Machines”, Third Edition, Prentice Hall, 2008.
3. Albert Y.Zomaya - "Handbook of Nature-Inspired and Innovative Computing",
Springer, 2006

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Muthukumarasamy S, Capgemini India Pvt Ltd,Chennai 1. Deivamani Mallaya, College of Engineering, Guindy, Chennai. 1. Ms.S.Kiruthika Devi, SRMIST
2. Dr. K. Deeba, SRMIST

43
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE255T COMPUTER GRAPHICS AND ANIMATION E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: identify various computer graphics drawing algorithms 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: provide understanding of 2D transformations and viewing methods

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: learn 3D transformations and viewing methods

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: explore Visible surface detection methods

Environment &
Sustainability
CLR-5: acquire the knowledge of animation and image processing methods

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: accrue the basic knowledge of computer graphics and various algorithms 3 2 3 - - - - - - - - - - 3 -
CO-2: implement 2D transformations and viewing methods 3 3 3 - - - - - - - - - - 3 -
CO-3: demonstrate various 3D transformations and viewing methods 3 3 3 - - - - - - - - - - 3 -
CO-4: apply various visible surface detection methods 3 2 3 - - - - - - - - - - 3 -
CO-5: develop various computer animations 3 - 3 - 2 - - - - - - - - 3 2

Unit-1 - Introduction to Computer Graphics 9 Hour


Overview of Computer Graphics, Computer Graphics Application and Software - Video Display devices - Raster scan systems - Random Scan systems - Graphics Monitors and Workstations - Input Devices - Hard-
Copy Devices - Graphics Software - Output Primitives - Points and Lines - Line-Drawing Algorithms - Circle-Generating Algorithms - Ellipse-Generating Algorithms - Parallel Curve Algorithms - Curve Functions -
Pixel Addressing - Filled-Area Primitives - Scan-Line Polygon Fill Algorithm Inside-Outside Tests Scan -Line Fill of Curved Boundary Areas - Boundary-Fill Algorithm - Flood-Fill Algorithm - Overview of various
attributes
Unit-2 - 2D Transformations 9 Hour
Introduction to 2D transformations Basic transformations - Matrix representations - Composite Transformations -Transformations - Shear- Affine- Reflection - 2D viewing - The Viewing Pipeline-viewing functions -
Clipping operations - Point clipping - Line Clipping -Cohen-Sutherland -Liang-Barsky- Nicholl-Lee-Nicholl - Line Clipping Using Nonrectangular Clip Windows - Splitting Concave Polygons - Polygon Clipping - Other
Clipping methods
Unit-3 - 3D Transformations 9 Hour
Introduction to 3D transformations Translations - Rotations - Reflections- shearing - Scaling - other transformations - Matrix Representation of 3D Transformations - 3D Viewing - Viewing Pipeline- Coordinates -
Projections -Parallel- Perspective -View Volumes and General Projection Transformations-General Parallel-Projection Transformations- Clipping-Hardware Implementations Three-Dimensional Viewing-Functions
Unit-4 - Visible-Surface Detection Methods 9 Hour
Introduction- Classification of Visible-Surface Detection Algorithms -Back-Face Detection-Depth-Buffer Method-Buffer Methods-Scan-Line Method-Depth-Sorting Method BSP-Tree Method-Area-Subdivision Method-
Octree Methods Ray-Casting Method-Curved Surfaces-Wireframe Methods-Visibility-Detection Functions- llumination Models and Surface-Rendering Methods-Light Sources Basic lllumination Models-Displaying
Light Intensities-Halftone Patterns and Dithering Techniques -Polygon-Rendering Methods-Ray-Tracing Methods -comparison of the methods.

44
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Computer Animation and Color Models 9 Hour
Principles of Animation, Key framing, Deformations- Motion Specifications S3- Color models - Properties of light- types - Color model conversion - applications - Mathematics for computer Graphics - Coordinate-
Reference Frames-Points and Vectors - Basis Vectors and the Metric Tensor- Matrices - Digital Image- File formats - Compression standard - JPEG- Enhancement and Constrast stretching- Practices on open
source image processing software

1. Donald Hearn and Pauline Baker M, ―Computer Graphics", Prentice Hall, 2nd Edition, 3. Computer Graphics Principles and Practice Third Edition by John F. Hughes, Andries Van Dam,
Learning New Delhi, 2007 Morgan Mcguire, David F. Sklar, James D. Foley, Steven K. Feiner Kurt Akeley, Addison- Wesley,
Resources 2. Fundamentals of Computer Graphics by Steve Marschner and Peter Shirley, 4th 3rd Edition, 2008
Edition, A K Peters/CRC Press, 2018 ISBN: 9781315360201 4. 4.Andleigh, P. K and Kiran Thakrar, ―Multimedia Systems and Design, Pearson Education, 2015

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. N. Madhu, Senior Analyst, Tata Elexsi, Siruseri. 1. Dr. N. Brindha, Associate Professor, Department of Computer Science 1. Dr. P. Murali, SRMIST
and Engineering, NIT, Trichy
2. Dr. Asha, Associate Professor, Department of Computer Science and
Engineering, VIT, Chennai

45
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE351T COMPUTATIONAL LOGIC E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: explore the basics of Propositional logic 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: provide skills on rules to handle Propositional logic and various deduction rules

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: learn the First order Logic and its applications

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: aquire the art of applying various inference rules in First Order Logic

Environment &
Sustainability
CLR-5: introduce Modal logic and its Inference rules

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the skills acquired on propositional logic to solve examples at hand 3 3 - - - - - - - - - - - - -
CO-2: analyze the rules learnt towards problem solving 3 3 - - - - - - - - - - - - -
CO-3: acquire mastery over FOL and Meta theorems and apply the same with confidence 3 3 - - - - - - - - - - - - -
CO-4: distinguish the acquired knowledge on AI under appropriate problem-solving contexts 3 3 - - - - - - - - - - - - -
CO-5: attempt to apply the acquired knowledge on modal logics under appropriate problem-solving contexts 3 3 - - - - - - - - - - - - -

Unit-1 - 9 Hour
Propositional Logic-Introduction-Syntax of PL-Is It a Proposition? - Interpretations-Models-Interpretations-Equivalences and Consequences-More About Consequence-A Propositional Calculus-Axiomatic System
PC-Five Theorems about PC-Using the Metatheorems-Adequacy of PC to PL-Compactness of PL
Unit-2 - 9 Hour
Normal Forms and Resolution-Truth Functions-CNF and DNF-Logic Gates-Satisfiability Problem-Resolution in PL-Resolution Strategies-Other Proof Systems for PL-Natural Deduction-Gentzen Sequent Calculus-
Analytic Tableaux
Unit-3 - 9 Hour
First Order Logic-Syntax of FL-Scope and Binding-Substitutions-Semantics of FL-Translating into FL-Satisfiability and Validity-Some Metatheorems-A First Order Calculus-Axiomatic System FC-Six Theorems about
FC-Adequacy of FC to FL-Compactness of FL
Unit-4 - 9 Hour
First Order Logic-Syntax of FL-Scope and Binding-Substitutions-Semantics of FL-Translating into FL-Satisfiability and Validity-Some Metatheorems-A First Order Calculus-Axiomatic System FC-Six Theorems about
FC-Adequacy of FC to FL-Compactness of FL
Unit-5 - 9 Hour
Modal Logic K—Introduction-Syntax and Semantics of K-Validity and Consequence in K-Axiomatic System KC-Adequacy of KC to K-Natural Deduction in K-Analytic Tableau for K-Other Modal Logics-Various
Modalities-Computation Tree Logic

46
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Arindama Singh,"Logics for Computer Science", PHI Learning Private Ltd,2nd Edition,2018 4. Dana Richards & Henry Hamburger,"Logic And Language Models For Computer
Learning 2. Wasilewska & Anita,"Logics for computer science: classical and non-classical",Springer ,2018 Science",Third Edition, World Scientific Publishing Co. Pte. Ltd, 2018.
Resources 3. Huth M and Ryan M, ǁ Logic in Computer Science : Modeling and Reasoning about 5. https://www.cs.cornell.edu/courses/cs3110/2012sp/lectures/lec15-logic-contd/lec15.html
systemsǁ,Cambridge University Press, 2005

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Masilamani , IITKD Kancheepuram 1. Dr.K.Senthil Kumar, SRMIST
2. Dr.G.Venkiteswaran, BITS Pilani

47
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE352T NEURO FUZZY AND GENETIC PROGRAMMING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the core concepts and architectures of Neural Networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: recognize Associative Memory and Adaptive Resonance Theory in Neural Networks

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: articulate the fundamentals and various models of Fuzzy Systems

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: illustrate the concepts of Genetic Algorithms

Environment &
Sustainability
CLR-5: integrate Neural Network, Fuzzy Logic, and Genetic Algorithm techniques

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the concepts of Neural Network for building intelligent systems 2 3 - - 2 - - - - - - - - 2 -
CO-2: correlate Associative Memory and Adaptive Resonance Theory in Neural Networks 2 3 - - 2 - - - - - - - - 2 -
CO-3: devise a framework for building Fuzzy Logic Systems 1 3 - - 3 - - - - - - - - 2 -
CO-4: examine the modelling of Genetic Algorithms 1 3 - - 3 - - - - - - - - 2 -
apply the concepts of Neural Network, Fuzzy Logic, and Genetic Algorithm for developing a framework for
CO-5: 3 3 - - 3 - - - - - - - - 2 -
hybrid systems

Unit-1 - Neural Networks 9 Hour


Introduction to Artificial Intelligence Systems, Fundamentals of Neural Networks- Basic concepts, Human brain, Model of an Artificial Neuron, Neural Network Architectures, Characteristics of Neural Networks,
Learning Methods, Taxonomy of Neural Network Architectures, History of Neural Network Research, Early Neural Network Architectures, McCulloch-Pitts Neuron Model; Back Propagation Networks - Architecture,
Backpropagation Learning, Illustration, Applications, Effect of Turning Parameters of the Backpropagation Neural Network, Selection of various parameters in BPN, Variations of Standard Backpropagation Algorithms;
Practice of Neural Network Tool - XOR Problem
Unit-2 - Associative Memory & Adaptive Resonance Theory 9 Hour
Associative Memory - Autocorrelators, Heterocorrelators, Wang et al.’s Multiple Training Encoding Strategy, Exponential BAM, Associative Memory for Real-coded Pattern Paris, Applications; Adaptive Resonance
Theory - Introduction, ART1, ART2, Applications, Sensitivities of Ordering of Data; Practice of Neural Network Tool- Delta Rule
Unit-3 - Fuzzy Logic 9 Hour
Fuzzification; Fuzzy Set Theory- Fuzzy versus Crisp, Crisp Sets, Fuzzy Sets, Crisp Relations, Fuzzy Relations; Fuzzy Systems- Crisp Logic, Predicate Logic, Fuzzy Logic, Fuzzy Rule Based System, Defuzzification
Methods, Practice of Fuzzy Logic Tool- Fuzzy Functions
Unit-4 - Genetic Algorithms 9 Hour
Genetic Algorithms- Basic Concepts, Creation of Offspring, Working Principle, Encoding, Fitness Function, Reproduction; Genetic Modelling - Inheritance Operators, Crossover, Inversion and Deletion, Mutation
Operator, Bitwise Operators used in GA, Generation Cycle, Conversion of Genetic Algorithm, Applications, Multilevel Optimization, Advances in GA, Practice of Optimization in Genetic Algorithm Tool

48
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Hybrid Systems 9 Hour
Introduction, Neural Networks, Fuzzy Logic, and Genetic Algorithms Hybrids; Genetic Algorithm based Back Propagation Networks - GA Based Weight Determination; Fuzzy Backpropagation Networks- LR Type
Fuzzy Numbers, Fuzzy Neuron, Fuzzy BP Architecture, Learning in Fuzzy BP; Fuzzy Logic Controlled Genetic Algorithms- GA in Fuzzy Logic Controller Design, Fuzzy Logic Controller, FLC-GA Based Structural
Optimization.

1. S. Rajasekaran, G. A. Vijayalakshmi Pai, "Neural Networks, Fuzzy Logic, and Genetic 4. S. N. Sivanandam, S. N. Deepa, "Principles of Soft Computing", Wiley, 3rd edition.
Algorithms, Synthesis and Applications", PHI Learning Private Limited, 15th Printing, 2011. 5. Dilip K. Prathihar, "Soft Computing - Fundamentals and Applications", Alpha Science
Learning 2. S. Rajasekaran, G. A. Vijayalakshmi Pai,"Neural Networks, Fuzzy Systems and Evolutionary International Limited, 2014.
Resources Algorithms" PHI Learning Private Limited, Second Edition, 2017. 6. Simon Hawkins, "Neural Networks", Pearson Education, 3rd edition, 2008.
3. L. Fortuna, G. Rizotto, M. Lavorgna, G. Nunnari, M. G. Xibilia, and R. Caponetto, "Soft 7. Lone, Y. A., Singh, H. (2019). Deep Neuro-Fuzzy Systems with Python: With Case Studies
Computing, New Trends and Applications", Springer, 2001. and Applications from the Industry. Germany: Apress.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Vinay Ramanath, Principal Key Expert cientist, Simulations 1. Dr. Y. Nancy Jane, Assistant Professor, Madras Institute of 1. Dr. Sindhuja M, SRMIST
and Digital Twins Siemens Technology. Technology, Anna University.
2. Prabakaran, Aerothermal Engineer - India Defence Rolls
Royce India Pvt Ltd.

49
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE353T AUGMENTED, VIRTUAL AND MIXED REALITY E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the concepts of Augmented, Virtual and Mixed Realties 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: apply the concepts to develop real world scenarios and components

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: practical understanding of concepts of Unity software

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: apply AR concepts to develop unreal use cases

Environment &
Sustainability
CLR-5: develop UI model using oculus quest

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: describe the similarities and differences between the Mixed Reality Technologies 3 - 2 - - - - - - - - - - - 2
CO-2: demonstrate ability to develop applications using AR / VR technologies 3 - 2 - - - - - - - - - - - 2
CO-3: build applications using unity - - 3 - 2 - - - - - - - - - 2
CO-4: develop use cases using unreal - - 3 - 2 - - - - - - - - - 2
CO-5: create user interface for VR applications - - 3 - 2 - - - - - - - - - 2

Unit-1 – Introduction to Mixed Reality 9 Hour


VR, AR, MR, xR: similarities and differences, Current trends, and state of the art in immersive technologies, The future of human experience - Human Perception and Cognition, Technology on Stereoscopic Display:
Immersion and Presence, Developing platforms and consumer devices, Physiology, Psychology and the Human Experience, Adaptation and Artefacts, Ergonomics, Ethics, Guidelines for Proper VR Usage, User-
Centered Design, User Experience: Scientific Concerns, VR Health and Safety Issues, Effects of VR Simulations on Users, Cyber sickness, before and now, Ethical Code of Conduct.
Unit-2 - AR components and Techniques 9 Hour
AR Frameworks, Practical understanding of real world AR application development, AR methodologies and project types,VR components and techniques, VR frameworks, Practical Understanding of real world VR
application development, VR methodologies and project types, Navigation and Manipulation Interface techniques in Blender
Unit-3 – Application Using Unity 9 Hour
AR advanced SDKs, AR core & Kit, AR spark studio, Vuforia engine, perform preliminary data quality and formatting, Hands on Unity Software and Use case applications, Purpose of Wikitude and 8th wall tools
Unit-4 – Unreal Engine and Techniques 9 Hour
Specific aspects of Unreal engine, Unreal engine vs unity, Unreal/Unity engine Physics & optimization techniques, Application demos, The present and the future of MR/xR
Unit-5 – Modeling the Physical World 9 Hour
Geometric Modeling- Kinematics Modeling- Physical Modeling-, Locomotion tools, Oculus setup and environment for object interaction, User Interface/Experience developed through Oculus Quest – Audio/video in
Immersive Environments, Introduction to Metaverse and applications, Behavior Modeling the functionalities of Metaverse applications through a Real-World Example

50
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. David Rose,”Super sight: What Augmented Reality Means for our lives, our work, and the 4. Jonathan Linowes, “Augmented Reality with Unity AR Foundation- a practical guide to cross
Learning way we imagine our future”, Nov 2021 platform AR development with Unity and later versions, 2021
Resources 2. Lily Sayter, Brain Solis, The augmented Workforce, 2020 5. Kenneth J.Varnum, Beyond Reality- Augmented Virtual and Mixed Reality in the library, 2020
3. Hevin W Allen, Meta Verse- A beginner’s guide to the new digital revolution

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Jagatheeswaran Senthilvelan, Head - IoT and 1. Prof Thuong Hoang Associate Head of School, Research Faculty of Sci Eng & Built Env School 1. Dr.M.Pushpalatha, Professor
Robotics, Auxo Labs of Info Technology Deakin University,Melbourne Burwood Campus, Australia
2. Mr.Gowtham, Head - Innovation and Technology, 2. Dr.Vaishnavi Moorthy, Assistant Professor
ProtoHubs.io

51
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE354T FULL STACK WEB DEVELOPMENT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce the Web Fundamentals 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: introduce the Client-side scripting with reac.js

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: introduce the Database Connectivity

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: introduce the Spring Framework with Basic Concepts

Environment &
Sustainability
CLR-5: introduce the Spring Boot and Micro-Services

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the Static Web Page Application 3 2 2 - - - - - - - - - 2 - -
CO-2: apply scripting at client side 3 2 2 - - - - - - - - - 2 - -
CO-3: connect with Database to do CRUD operations 3 2 2 - - - - - - - - - 2 - -
CO-4: develop, Maintain and applications using Spring Boot Framework 3 2 3 - - - - - - - - - 2 - -
CO-5: ability to use Microservices 3 2 2 - - - - - - - - - 2 - -

Unit-1 - HTML, CSS Overview 9 Hour


HTML Overview: Structuring an HTML Document, Validating and debugging your code, Working with Fonts, Text Blocks, Lists and Tables, Using External and Internal Links, Working with Colors, Images, and
Multimedia.CSS Overview: Understanding Cascading Style Sheets, Working with Margins, Padding, Alignment and Floating, Understanding the CSS Box Model and Positioning, Using CSS to do more with Lists,
Text, and Navigation, Creating Layouts Using modern CSS Techniques, Taking Control of Backgrounds and Borders, Using CSS Transformations and Transitions, Animating with CSS and the Canvas.
Unit-2 - JavaScript, React JS Overview 9 Hour
JavaScript Overview: Understanding JavaScript, Understanding Dynamic Websites and HTML5 Applications, Getting Started with JavaScript Programming, working with the Document Object Model (DOM), Using
JavaScript Variables, Strings, and Arrays, Controlling Flow with Conditions and Loops, Responding to Events and Using Windows, JavaScript Best Practices., Using Third-Party JavaScript Libraries and Frameworks.
React JS: The Foundation of React, JSX, All About Components of React, Events, Forms, Refs, Styling React, Routing, Hooks: Rules of Hooks, The Built-in Hooks (useState, useEffect, useContext, useMemo,
useRef), Writing Custom Hooks, Labeling Custom Hooks with useDebugValue, Finding and Using Custom Hooks.
Unit-3 - SQL, JDBC Overview 9 Hour
SQL Overview: Basics of SQL: Data basics, Retrieval: Basic Selection, Joins, Set Queries: UNION, INTERSECT, and EXCEPT, Subqueries, Modifying Data: Insert, Delete, Update, Creating, Deleting, and Altering
Tables, JDBC: Introduction to JDBC: Setting up the database, connecting to a Database: The Connection Interface, connecting to the database using Driver Manager, Querying and Updating the Database: Statement
Interface, Result Set Interface, Querying and Updating the Database.
Unit-4 - Spring Boot Framework-Part-1 9 Hour
Spring Boot Framework-Part-1: Basic concepts: Spring, Spring Boot, Testing Basics, Testing in Spring Boot. A Basic Spring Boot Application: Setting up the Development Environment, The Skeleton Web App, and
Spring Boot Auto configuration, Three-Tier, Three-Layer Architecture, Modeling our Domain, Business Logic, and Presentation Layer.

52
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Spring Boot Framework-Part-2 9 Hour
Spring Boot Framework-Part-2: The Data Layer: The Data Model, choosing a Database, Spring Boot Data JPA, Entities, Repositories, Storing Users and Attempts. Microservices: Moving to Microservices, Architecture
Overview, Designing and Implementing the New Service, User Interface UI

1. Sams Teach Yourself HTML, CSS, and JavaScript All in One, Julie Meloni, First Edition 6. Programming the World Wide Web, by Robert W. Sebesta, Eighth Edition - 2014, Published by
2019, Pearson. (Unit - I, Unit - II) Pearson.
2. BEGINNING ReactJS Foundations Building User Interfaces with ReactJS: AN 7. Internet and World Wide Web How to Program, Paul Deitel, Harvey Deitel, and Abbey Deitel,
APPROACHABLE GUIDE, Chris Minnick, First Edition 2022, Published by John Wiley & Fifth Edition - 2011, Published by Prentice Hall.
Sons. (Unit - II) 8. Database Programming with JDBC and Java, by George Reese, Second Edition - 2000,
3. SQL Practical Guide for Developers, Michael J. Donahoo & Gregory D. Speegle, 2005, Published by O'Reilly Media.
Learning
Morgan Kaufmann Publishers an Imprint of Elsevier. (Unit - III) 9. Expert Oracle JDBC Programming, by R. M. Menon, First Edition - 2005, Published by Apress.
Resources
4. Oracle Certi¬fied Professional JavaSE 8 Programmer, Exam 1Z0-809 A Comprehensive 10. Pro Spring MVC with WebFlux: Web Development in Spring Framework 5 and Spring Boot 2,
OCPJP 8 Certi-fication Guide, by S G Ganesh, Hari Kiran & Tushar Sharma, 2016, by Marten Deinum and Iuliana Cosmina, Second Edition - 2022, Published by Apress.
APress publisher. (Unit – III) 11. Full stack development with Spring Boot and React: build modern and scalable full stack
5. Learn Microservices with Spring Boot: A Practical Approach to RESTful Services Using applications using the power of Spring Boot and React, by Juha Hinkula, Third Edition - 2022,
an Event-Driven Architecture, Cloud-Native Patterns, and Containerization, Moisés Published by
Macero García, Second Edition – 2020, APress Publisher. 12. Spring Boot in Practice, Somnath Musib, First Edition - 2022, Manning Publications.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
Dr.Mariappan, Uber 1. Mr.Suresh Anand, SRMIST
2. Ms. N.Anbarasi, SRMIST

53
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE355T DATA MINING AND ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce the basic concepts of pattern discovery and data preparation 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the importance of Association and Correlation Algorithms

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: comprehend and apply various Classifiers

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: work with the foundation for Clustering

Environment &
Sustainability
CLR-5: perform Outlier Analysis and Explore a data mining tool

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: do the preprocessing of data before mining of data for patterns 1 2 - - - - - - - - - - 2 - -
CO-2: make use of Association and Correlations Algorithms for framing association rules 1 2 - - 3 - - - - - - - 2 - -
CO-3: apply as well as Compare the performance of various classifiers 1 2 - - 3 - - - - - - - 2 - -
CO-4: utilize different Clustering algorithms for generalization 1 - - - 3 - - - - - - - 2 - -
CO-5: identify Outliers in the data given 1 2 - - 3 - - - - - - - 2 - -

Unit-1 - Data Mining Introduction 9 Hour


Introduction: Kinds of Data- Kinds of Patterns-Data Objects and Attribute Type- Data Visualization -Data Preprocessing: Data cleaning, Data Integration, Data Transformation, Data Discretization and Data Reduction:
Attribute Subset Selection-Histograms, Clustering, Sampling
Unit-2 - Associations and Correlations 9 Hour
Market Basket Analysis – Apriori Algorithm – Mining Frequent Itemsets without Candidate Generation – Mining Frequent Itemsets Using Vertical Data Format – Mining Closed Frequent Itemsets – Mining Multilevel
Association Rules – Mining Multidimensional Association Rules – Correlation Analysis – Constraint-Based Association Mining
Unit-3 - Classification and Prediction 9 Hour
Basic Concepts- Decision Tree Induction-Attribute selection Measures-ID3 and CART algorithms, Tree Pruning-Bayes Classification Methods: Bayes‟ Theorem, Naive Bayesian Classification - Classification by
Backpropagation- Support Vector Machines-Lazy learners: KNN-Metrics for evaluating classifier performance-Techniques to improve classification accuracy-Prediction: Regression Analysis
Unit-4 - Cluster Analysis 9 Hour
Cluster Analysis: Partitioning Methods- Hierarchical Methods: Agglomerative versus Divisive Hierarchical Clustering-Probabilistic Model based Clustering - BIRCH, DBSCAN, STING, CLIQUE Techniques- Evaluation
of clustering Techniques
Unit-5 - Outliers and Statistical Approaches in Data Mining 9 Hour
Introduction to outliers, Challenges in detecting Outliers,Outlier Detection Methods - Supervised, Semisupervised, Unsupervised- Statistical Data Mining approaches - Data mining in Recommender Systems,Data
mining for Intrusion Detection, Data Mining for Financial Analysis

54
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning 1. Jiawei Han and Micheline Kamber, “Data Mining Concepts and Techniques”, 2. Ian H. Witten, Eibe Frank and Mark A. Hall “Data Mining: Practical Machine Learning
Resources Third Edition, Elsevier, 2012 Tools and Techniques”, Fourth Edition, Elsevier, 2017.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. T. Ruso,Senior Project Lead, HCL Technologies, Chennai 1. Khanna Nehemiah, Associate Professor, Anna University Chennai

55
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE356T NATURAL LANGUAGE PROCESSING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the fundamentals behind the Language processing and perform word level analysis 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the syntactic processing and probabilistic context-free grammars

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


CLR-3: conceive the basics of the knowledge representation, inference, and discourse analysis

Modern Tool Usage

Life Long Learning


complex problems
CLR-4: recognize the significance of transformer-based models

Problem Analysis

Communication
Environment &
understand the natural language processing applications and to learn how to apply basic algorithms in this

Sustainability
CLR-5:
field

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: exhibit knowledge on text preprocessing techniques and perform word level analysis 3 3 2 - - - - - - - - - 2 - -
CO-2: illustrate approaches to syntax analysis including probabilistic context-free grammars 3 3 2 - - - - - - - - - 2 - -
CO-3: apply approaches to semantics and discourse analysis in NLP 3 3 2 - - - - - - - - - 2 - -
CO-4: develop models using transfer learning approaches 3 - - 3 3 - - - - - - - 2 - -
CO-5: implement applications that use Natural Language Processing approaches - - 2 3 3 - - - - - - - - - -

Unit-1 - Overview and Word Level Analysis 9 Hour


Introduction to Natural Language Processing, Applications of NLP, Levels of NLP, Regular Expressions, Morphological Analysis, Tokenization, Stemming, Lemmatization, Feature extraction: Term Frequency (TF),
Inverse Document Frequency (IDF), Modeling using TF-IDF, Parts of Speech Tagging, Named Entity Recognition, N-grams, Smoothing.
Unit-2 - Syntax Analysis 9 Hour
Context Free Grammars, Grammar Rules for English, Top-Down Parsing, Bottom-Up Parsing, Ambiguity, CKY Parsing, Dependency Parsing, Earley Parsing - Probabilistic Context-Free Grammars
Unit-3 - Semantic and Discourse Analysis 9 Hour
Representing Meaning, Lexical Semantics, Word Senses, Relation between Senses, Word Sense Disambiguation, Word Embeddings, Word2Vec, CBOW, Skip-gram and GloVe, Discourse Segmentation, Text
Coherence, Discourse Structure, Reference Resolution, Pronominal Anaphora Resolution, Coreference Resolution
Unit-4 - Language Models 9 Hour
Recurrent Neural Networks (RNN), Long Short-Term Memory (LSTM), Attention mechanism, Transformer Based Models, Self-attention, multi-headed attention, BERT, RoBERTa, Fine Tuning for downstream tasks,
Text classification and Text generation.
Unit-5 - NLP Applications 9 Hour
Introduction to Chatbot Applications, Retrieval based- Conversation based, Information Extraction and its approaches, Information Retrieval, Semantic Search and Evaluation, Question Answering, Summarization,
Extractive Vs Abstractive Summarization, Machine Translation.

56
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Daniel Jurafsky and James H Martin, "Speech and Language Processing: An introduction 4. Rothman, Denis. Transformers for Natural Language Processing: Build innovative deep neural
to Natural Language Processing, Computational Linguistics and Speech Recognition”, network architectures for NLP with Python, PyTorch, TensorFlow, BERT, RoBERTa, and more.
Learning Prentice Hall, 2nd Edition, 2018. Packt Publishing Ltd, 2021.
Resources 2. C.Manning and H.Schutze, ―Foundations of Statistical Natural Language Processingǁ, 5. http://mccormickml.com/2106/04/19/word2vec- tutorial-the-skip-gram-model/
MIT Press. Cambridge, MA,1999 6. https://nlp.stanford.edu/pubs/glove.pdf
3. JamesAllen, Bejamin/cummings, ―NaturalLanguageUnderstandingǁ,2ndedition,1995

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. J.Balaji, Associate Manager,Allstate Solutions Pvt Ltd, 1. Dr. Vani. V, Assistant Professor, National Institute of Technology 1. Dr. R. Anita, SRMIST.
[email protected] Puducherry
2. Dr.Subalalitha C.N , SRMIST
3. Ms.Viji D , SRMIST

57
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE357T DISTRIBUTED COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: infer knowledge in distributed computing 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: introduce about snapshot recording and graph algorithm

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: demonstrate about various distributed mutual exclusion algorithms

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understanding about various Deadlock Detection

Environment &
Sustainability
CLR-5: outline the knowledge about Checkpointing and rollback recovery

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: use the appropriate concepts of Distributed computing for resource utilization - - 2 2 2 - - - - - - - 1 - -
CO-2: formulate various Snapshot Recording and Graph Algorithms - - 2 2 2 - - - - - - - 2 - -
CO-3: apply appropriate Distributed mutual exclusion algorithms - - 3 3 3 - - - - - - - 2 - -
CO-4: design a deadlock system to implement various deadlock detection algorithms - - 3 3 3 - - - - - - - 2 - -
CO-5: develop and implement various Checkpointing and rollback recovery - - 2 2 2 - - - - - - - 2 - -

Unit-1 - Introduction to Distributed Computing 9 Hour


Primitives for distributed communication, Synchronous versus asynchronous executions, Design issues and challenges, A model of distributed executions, Global state of a distributed system, Cuts of a distributed
computation, A framework for a system of logical clocks, Jard–Jourdan’s adaptive technique, Physical clock synchronization: NTP, Classifications and basic concepts, Complexity measures and metrics
Unit-2 - Snapshot Recording and Graph Algorithms 9 Hour
Snapshot algorithms for FIFO channels, Variations of the Chandy–Lamport algorithm, Snapshot algorithms for non-FIFO channels Snapshots in a causal delivery system, monitoring global state, Necessary and
sufficient conditions for consistent global Snapshots, Finding consistent global snapshots in a distributed computation, Elementary graph algorithms. A spanning-tree-based termination detection algorithm
Unit-3 - Distributed Mutual Exclusion Algorithms 9 Hour
Lamport’s algorithm, Ricart–Agrawala algorithm, Singhal’s dynamic information-structure algorithm, Lodha and Kshemkalyani’s fair mutual exclusion algorithm, Quorum-based mutual exclusion algorithms,
Maekawa’s algorithm, Agarwal–El Abbadi quorum-based algorithm, Token-based algorithms, Suzuki–Kasami’s broadcast algorithm, Raymond’s tree-based algorithm
Unit-4 - Deadlock Detection 9 Hour
Models of deadlocks, Knapp’s classification of distributed deadlock detection Algorithms, Mitchell and Merritt’s algorithm for the single-resource model, Chandy–Misra–Haas algorithm for the AND model, Chandy–
Misra–Haas algorithm for the OR model, Kshemkalyani–Singhal algorithm for the P-out-of-Q model
Unit-5 - Checkpointing and Rollback Recovery 9 Hour
Background and definitions, Issues in failure recovery, Checkpoint-based recovery, Log-based rollback recovery, Koo–Toueg coordinated checkpointing algorithm, Juang–Venkatesan algorithm for asynchronous
checkpointing and recovery, Manivannan–Singhal quasi-synchronous checkpointing algorithm, Peterson–Kearns algorithm based on vector time, Helary–Mostefaoui–Netzer–Raynal communication-induced protocol.

58
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Distributed Computing: Principles, Algorithms, and Systems Paperback – 3 March 2011 3. Tanenbaum S. Maarten V.S.: Distributed Systems Principles and Paradigms, (Pearson
Learning
by Ajay D. Kshemkalyani (Author), Mukesh Singhal (Author Education)
Resources
2. Tanenbaum S.: Distributed Operating Systems, Pearson Education 4. George Coulouris, Jean Dollimore. Tim Kindberg: Distributed Systems concepts and design.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. T. Ruso. Senior Project Lead, HCL Technologies,Chennai 1. Dr.T.Sethukarasi, Professor and Head, Dept of CSE, RMK Engineering College 1. Dr.G.Padmapriya, SRMIST

59
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE358T NETWORK SECURITY AND CRYPTOGRAPHY E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understanding the basic concepts of security services and its mechanisms 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: apply the different symmetric key cryptographic techniques

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: analyze the various asymmetric key cryptographic techniques

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: apply the message authentication and hash functions

Environment &
Sustainability
CLR-5: develop the security applications in networks

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the knowledge of security services and techniques 1 2 - - - - - - - - - - 2 - -
CO-2: analyze the symmetric key algorithms 2 3 1 - - - - - - - - - 2 - -
CO-3: apply the various asymmetric key algorithms 2 3 - - - - - - - - - - 2 - -
CO-4: evaluate the various MAC and Hash functions - 3 2 - - - - - - - - - 2 - -
CO-5: analyze the security applications - - 3 - 2 - - - - - - - 2 - -

Unit-1 - Introduction to Security Concepts 9 Hour


The need for security- Security approaches- Principles of security- Types of Security attacks- Security services- Security Mechanisms- A model for Network Security- substitution techniques- transposition techniques-
steganography.
Unit-2 - Symmetric Key Cryptography 9 Hour
lgebraic structures – Divisibility and division algorithm - Euclidean algorithm- Modular arithmetic-Prime numbers - Fermats and Eulers theorem - Congruence and matrices - Block Ciphers and operations - Simplified
Data Encryption Standard - Data Encryption Standard - Advanced Encryption Standard
Unit-3 - Asymmetric Key Cryptography 9 Hour
Groups, Rings, Fields- Finite fields - Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange- Elliptic Curve Cryptography
Unit-4 - Message Authentication Algorithms and Hash Functions 9 Hour
Message Authentication, Secure Hash Algorithm (SHA-3) - Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme- Kerberos, X.509 Authentication Service, Public – Key
Infrastructure.
Unit-5 - Security in Networks 9 Hour
Web security considerations-Secure Socket Layer and Transport Layer Security-Secure electronic transaction- Email security - PGP, S/MIME-Intruders-Intrusion detection- password management -virus and related
threats- Countermeasures-Firewall design principles- types of firewalls, Case Studies on Cryptography and security: Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability, Virtual Elections

Learning 1. Cryptography and Network Security Principles and Practice Seventh Edition, William 2. Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition, 2013.
Resources Stallings, Pearson 2017. 3. BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2010.

60
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 25% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Mariappan, Uber 1. Dr.G.K.Sandhia,SRMIST

61
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE359T INFORMATION STORAGE AND MANAGEMENT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: acquire the knowledge on the components of storage infrastructure 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: learn the various types of Storage evolution architecture

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the business continuity, backup and recovery methods

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: introduce the working principle of storage infrastructure with monitoring principles

Environment &
Sustainability
CLR-5: understand the structure of cloud computing and its techniques

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: exhibit knowledge on the components of storage infrastructure - 3 3 - 1 - - - - - - - 1 - -
CO-2: gain knowledge to evaluate storage architectures including storage subsystems - 3 3 - 1 - - - - - - - - 2 -
CO-3: understand the business continuity, backup and recovery methods - 3 3 - 1 - - - - - - - - 2 -
CO-4: appreciate the concepts of storage security and information security applied to virtual machine - 3 3 - 1 - - - - - - - 2 - -
CO-5: acquire the knowledge on structure of cloud computing and its techniques - 3 3 - 3 - - - - - - - 1 - -

Unit-1 - Introduction to Information Storage and Management 9 Hour


Introduction to Information Storage Management- Evolution of Storage Architecture- Data Centre Infrastructure- Evaluate storage architectures and key data center elements in classic, virtualized and cloud
environments- physical and logical components of a storage infrastructure including storage subsystems, RAID and intelligent storage systems- Intelligent Storage Array T1: A hospital application stores the Patient
records with core elements of the data center. Discussion of typical challenges the storage management team may face in meeting the service-level demands of the hospital staff
T2: Design RAID- Real Life Scenario Business Application for Acme Telecom
Unit-2 - Introduction to SAN, IPSAN and CAS 9 Hour
storage networking technologies -SAN- FCSAN- IP-SAN, IPSAN-iSCSI components FCoE- NAS and object-based, and unified storage (CAS) – NAS I/O Operations- NAS Implementations
T5: USRobotics Mini NAS provides easy backup and remote access for college office setting
T6: SAN Infrastructure implementation at Heterogeneous environment
T7: Configuration and Tracing of FC scan and iSCSI scan
Unit-3 - Introduction to Electronic Storage Information 9 Hour
Electronically Stored Information and the Federal Rules of Civil Procedure- Changes to the Federal Rules of Civil Procedure-Federal Rules of Evidence-The (Long) List of Stakeholders-Ownership of Data-Data
Control Considerations-Business Continuity (BC) Terminology, BC Planning life cycle- Failure Analysis, Business Impact Analysis-Automatic Path fail over-Backup granularities
T7: Discussion of Social Media Cases and Spoliation Cases
T8: Use Backup techniques for archived data
T9: Implement appropriate backup and restore model in virtual environments for sensitive information

62
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Introduction to Storage Security, Recovery and Acquisition 9 Hour
Applications as a Vital User Interface-Hidden or Restricted Access Data -Privileged, Sensitive, and Inaccessible Data Management-Proving Ownership and Integrity-Legal and Forensically Sound Acquisition -
Securing the Data-Access Control and Management-Organization and File Management Techniques-Safe Storage Issues and Considerations Information Security Framework-Risk Triad-Storage Security Domains.
T10: Analyze various monitoring parameters in secured storage environment
T11: Creation of Linux Instance in Public Cloud Generate a private key, Access using SSH client
T12: Usage of RSA and VMware Security Products
Unit-5 - Cloud Storage 9 Hour
key characteristics, services, deployment models, and infrastructure components for a cloud computing-Cloud Infrastructure Mechanism-Cloud Infrastructure Mechanism: Cloud Infrastructure Mechanism-Logical
Network Perimeter-Cloud Usage Monitor-Cloud Adoption Considerations-Cloud Storage Gateways
T13: Building programs to deploy cloud applications
T14: Usage of Cloud services with open-source cloud tools (like Eucalyptus, Openstack, Open Nebula and others)

1. David R Matthews, Electronically Stored Information The Complete Guide to Management, 3. Thomas Erl, ―Cloud Computing: Concepts, Technology & Architectureǁ, Prentice Hall
Learning Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition ,2013,ISBN: 9780133387568
Resources 2. 2.EMC Corporation, ―Information Storage and Managementǁ,2nd edition Wiley India, 4. UifTroppen Rainer Wolfgang Muller,ǁStorage Networks Explainedǁ, India, Wiley, 2010,
ISBN13: 978- 1118094839 ISBN13: 978- 0470741436

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.V.Masillamani 1. Dr.D.Hemavathi, SRMIST

63
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE360T HIGH PERFORMANCE COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the concepts of advanced processors 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: learn the core of high-end computers, components, and their capacities

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the need for parallel algorithms

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: build applications using parallel programming paradigm

Environment &
Sustainability
CLR-5: build solutions using programming model

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: elucidate on advanced processors 1 1 - - 1 - - - - - - - - - -
CO-2: analyze the working of cluster and sky computing 1 - 1 1 - - - - - - - - - - -
CO-3: apply Parallel Algorithmic concepts to solve problems - 3 3 1 - - - - - - - - - 3 -
CO-4: develop applications using OpenMP and MPI - 1 1 1 - - - - - - - - - 3 -
CO-5: describe GPU architecture and write programs using CUDA - - 1 1 2 - - - - - - - - 3 -

Unit-1 - Fundamentals of Parallel Processors 9 Hour


Stored Program Computer Architecture- General purpose cache- based microprocessor-Performance based metrics and benchmarks- Moore's Law- Pipelining- Superscalarity- SIMD- Memory Hierarchies Cache-
mapping- prefetch- Multicore processors- Mutithreaded processors- Vector Processors- Design Principles- Maximum performance estimates- Programming for vector architecture – Data flow computers and VLSI
Computations – Need for Migrating to Nanoscale Processors – Design of Quantum Processors and Quantum Logic gates with Qubits Processing
Unit-2 - Performance Enhancement Computing Cluster Computing and Sky Computing 9 Hour
Introduction to Cluster Computing- Scalable Parallel Computer Architectures- Cluster Computer and its Architecture- Classifications, Components for Clusters- Cluster Middleware and Single System Image-
Resource Management and Scheduling, Programming Environments and Tools, Applications, Representative Cluster Systems, Heterogeneous Clusters, Security, Resource Sharing, Locality, Dependability,
Cluster Architectures, Detecting and Masking Faults, Recovering from Faults, Condor, Evolution of Metacomputing. Virtualised Architecture for Cloud Computing Storage, Hypervisor usage and Integration of
Cloud Computing for Sky Computing Model
Unit-3 - Perspective of Parallel Algorithms 9 Hour
Principles of parallel algorithm design - Data Parllel, Task graph, Work pool, master- slave, pipeline, Hybrid – Non –numerical algorithms, sorting, graph algorithms, search algorithms for discrete optimization
problems,Dynamic programming – Numerical algorithms, Dense matrix algorithms, fast Fourier transforms
Unit-4 - Constructs of Parallel Programming 9 Hour
Introduction to parallel computing – parallel programming platforms – Basic communication operations –Programming using message passing paradigm, MPI– Programming shared address space platforms, POSIX
threads, open MP
Unit-5 - Gpu Architecture and Programming 9 Hour
Hardware Architecture – Integrated GPUs –Multi GPUs – GPU Architecture - Memory Handling with CUDA: Shared Memory, Global Memory, Constant Memory and Texture Memory.Introduction to CUDA C, parallel
programming in CUDA C , Thread cooperation- Shared Memory and Synchronization
64
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Georg Hager, Gerhard Wellein, Introduction to High Performance Computing for Scientists 5. Nicholas Wilt, ―CUDA Handbook: A Comprehensive Guide to GPU Programmingǁ, Addison
and Engineers, Chapman & Hall / CRC Computational Science series, 2011. - Wesley, 2013.
2. Parag K. Lala “Quantum Computing: A Beginners Introduction”, Mc Graw Hill, 2020. 6. Jason Sanders, Edward Kandrot, ―CUDA by Example: An Introduction to General Purpose
Learning
3. R. Buyya, High Performance Cluster Computing: Architectures and Systems, Volume 1, GPU Programmingǁ, Addison - Wesley, 2010.
Resources
Pearson Education, 2008. 7. https://link.springer.com/article/10.1007/s10586-017-0727-5
4. Introduction to Parallel Computing, Ananth Grama, Anshul Gupta, George Karypis, and Vipin 8. http://www.nvidia.com/object/cuda_home_new.html
Kumar, 2nd edition, Addison-Welsey, 2003.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 25% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Hemant Giri, NIVIDIA 1. Dr.R.S.Singh, IIT, BHU, Varanasi 1. Dr.R.S.Ponmagal, SRMIST
2. AmarendraMohanty, AdvantagePro 2. Dr.Pradheepkumar, BITS, PILANI 2. Dr.Sathyapriya, SRMIST

65
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE361T DATABASE SECURITY AND PRIVACY E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: realize the fundamentals of security relates to information 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: gain knowledge of how security is maintained in information systems

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: comprehend the concept of security models in database

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: study about the practices of database auditing

Environment &
Sustainability
CLR-5: implementation of data mining algorithms for PPDM

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the knowledge of information system and information security 3 - 2 - - - - - - - - - 1 - -
CO-2: manage the security of information system as well as database 3 3 - - 1 - - - - - - - 1 - -
CO-3: design and develop the security model in database 3 - 3 - - - - - - - - 2 3 - -
CO-4: mange the audit database activities, users, security 3 - - 2 - - - - - - - - 1 - -
CO-5: apply the security mechanism in PPDM using various algorithms 3 2 2 - - - - - - - - - 1 - -

Unit-1 - Security Architecture 9 Hour


Introduction, Information Systems, Database Management Systems, Information Security Architecture, Database Security, Asset Types and Their value, Security Methods. Operating System Security Fundamentals:
Introduction, Operating System Overview, The Components of an Operating System Security Environment, Authentication Methods, User Administration, Password Policies, Vulnerabilities of Operating Systems,
Email Security, Internet security
Unit-2 - Administration of Users 9 Hour
Introduction, Documentation of User Administration, Operating System Authentication, Creating Users, creating a SQL Server user, removing users, Modifying users, Default users, Remote users, Database Links,
Linked Servers, Remote Servers Practices for Administrators and Managers, Profiles, Password Policies. Privileges and Roles: Introduction, Defining and Using Profiles, Designing and Implementing Password
Policies, Granting and Revoking User Privileges, Creating, Assigning and Revoking User
Roles, Best practices
Unit-3 - Database Application Security Models 9 Hour
Types of Users, Security Models, Application Types, Application Security Models, Transparent Data Encryption, Column Encryption Full Database Encryption, Column level Security with SQL Server. Virtual Private
Databases: Implementation of VPD using Views, Application Context in Oracle, Implementing Oracle VPD, Viewing VPD Policies, VPD using views, Application contexts using Data Dictionary, Policy Manager
Implementing Row and Column level Security with SQL Server
Unit-4 - Audits 9 Hour
Ways to Audit a Database, Application API Code, Auditing with Trigger Code, Normal Audit, Unified Audit, Fine Grained Auditing, Comparing Methods Auditing Database Activities: Oracle Database Activities,
Creating DLL Triggers with Oracle, Auditing Database Activities with Oracle, Auditing Server Activity with SQL Server 2022, Auditing Server Activity with Oracle21c, Case study: project security and auditing

66
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Privacy Preserving Techniques 9 Hour
Privacy Preserving Data Mining Techniques, Privacy Preserving Data Mining Models and Algorithms-The Randomization Method, Group Based Anonymization, Distributed Privacy-Preserving Data Mining, Privacy-
Preservation of Application Results, and Applications of Privacy-Preserving Data Mining. Case study: Joseph Domingo-Ferrer, Nine Measures of Anonymity, k-Anonymous Data Mining

1. HassanA.Afyouni, "Database Security and Auditing Protecting Data Integrity and 3. Osama Mustafa and Robert P. Lockard," Oracle Database Application Security with Oracle Internet
Accessibility", Third Edition, Cengage Learning, 2013. Directory, Oracle Access Manager, and Oracle Identity Manager", First Edition Apress Publishers,
Learning
2. RonBenNatan," Implementing Database Security and Auditing", Elsevier Digital 2019
Resources
Press,2005 4. Charu C. Aggarwal and Philip S Yu," Privacy Preserving Data Mining Models and Algorithms",
Kluwer Academic Publishers, 2008

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.S.Kumarasamy, Assistant Manager - MSSQL ,Sify 1. Dr.L.Jayakumar, Assistant professor, Department of computer science and 1. Dr.S.Gnanavel, SRMIST
Technologies Limited,Chennai-600113 engineering, National institute of technology, Agartala, Tripura.
2. Dr.K.Jayashree, Professor, Panimalar engineering college, Chennai 2. Dr.C.Pretty Diana Cyril, SRMIST

67
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE362T CLOUD COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the cloud concepts with its features 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: learn the cloud architecture and services

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: comprehend Security aspects for Cloud platforms

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: study the basic concepts of Virtualization and capacity planning

Environment &
Sustainability
CLR-5: gain knowledge on Cloud Applications of different service providers

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: exhibit knowledge on basics of Cloud Computing 2 1 - - - - - - - - - - 2 - -
CO-2: identify then type of services for various applications 1 3 1 - - - - - - - - - 2 - -
CO-3: predict the type of security to be applied for various cloud services 1 - 2 - - - - - - - - - 2 - -
CO-4: examine the concept of virtualization and capacity planning 2 1 - - 2 - - - - - - - 2 - -
CO-5: recommend the service provider for specific requirement 2 - - 1 2 - - - - - - - 2 - -

Unit-1 - Fundamentals of Cloud Computing 9 Hour


Define Cloud Computing, Cloud Types, Characteristics of Cloud Computing, Benefits and disadvantages of cloud systems, Assessing the Value Proposition, Measuring the Cloud’s Value, Capital Expenditures,
Total Cost of Ownership, Service Level Agreements, Licensing Models
Unit-2 - Cloud Architecture and Services 9 Hour
Cloud Computing Stack, Composability, Infrastructure, Platforms and Virtual Appliances, Communication Protocols and Applications, Connecting to the Cloud, Infrastructure as a Service (IaaS), Platform as a Service
(PaaS), Software as a Service (SaaS)
Unit-3 - Cloud Security 9 Hour
Cloud Security Challenges, Software-as-a-Service Security, End-User Access to Cloud Computing Overview, Identity Protocol Standards, Windows Azure Identity Standards
Unit-4 - Virtualization and Capacity Planning 9 Hour
Virtualization Technologies, Abstraction versus Virtualization, Load Balancing and Virtualization, The Google Cloud, Hypervisors, Virtual Machine Imaging, Porting Applications, Capacity Planning
Unit-5 - Cloud Computing Applications 9 Hour
Web Services: Amazon, Microsoft, Google, Case Studies:, Cloud as Infrastructure for an Internet Data Center (IDC), Cloud Computing for Software Parks, Enterprise with Multiple Data Centers

1. Barrie Sosinsky (2011), "Cloud Computing Bible” Wiley Publishing Inc. 4. Michael Kavis, (2014) "Architecting the Cloud: Design Decisions for Cloud Computing Service
Learning 2. John W. Rittinghouse and James F. Ransome (2010), "Cloud Computing, Models (SaaS, PaaS, AND IaaS)", John Wiley & Sons.
Resources Implementation, Management, and Security", CRC Press. 5. Sunil kumar Manvi, Gopal K. Shyam (2021) "Cloud Computing: Concepts and Technologies", CRC
3. Borko Furht, Armando Escalante (2010), "Handbook of Cloud Computing", Springer. Press, 1st edition.

68
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 20% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. T. Ruso, Senior Project Lead, HCL Technologies, Chennai 1. Dr. P. Varalakshmi, Professor, MIT, AnnaUniversity, Chennai 1. Dr. D. Malathi, Professor, SRMIST
2. Mr. Saju G Nair, Senior Development ManagerKyndryl India Pvt Ltd. 2. Dr. S. Gopika, Kristu Jayanti College, Bangalore. 2. Dr. J. D. DorathiJayaseeli, SRMIST

69
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE399T ADVANCED MOBILE COMMUNICATIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the evolution of mobile communications 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: familiarize the basics of 5G technology

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand and apply the 5G networks and standards

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand and apply the 5G protocols, SDN and NFV

Environment &
Sustainability
CLR-5: know the current state of the art technologies and challenges in 5G

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand and analyze the evolution of mobile communications 3 - - - - - - - - - - - - -
CO-2: analyze and apply 5G technology on 3 - - - - - - - - - - - - -
CO-3: evaluate the 5G networks and standards 3 - - - 2 - - - - - - - - - -
CO-4: apply the 5G protocols, SDN and NFV in implementations 3 - 2 - 2 - - - - - - - - - -
CO-5: know the current state of the art technologies and challenges in 5G 2 - 2 - 2 - - - - - - - - - -

Unit-1 - Evolution from 1G to 5G 9 Hour


Analog voice systems in 1G; digital radio systems in 2G, voice and messaging services, TDMA based GSM, CDMA, 2.5G (GPRS), 2.75G (EDGE); IMT2000: 3G UMTS, W-CDMA, HSPA,
HSPA+, 3G services and data rates; IMT Advanced: 4G, LTE, VoLTE, OFDM, MIMO, LTE Advanced Pro (3GPP Release 13+); IMT2020: 5G, enhancements in comparison to IMT Advanced.
Unit-2 - Basics of 5G 9 Hour
5G potential and applications; Usage scenarios: enhanced mobile broadband (eMBB), ultra-reliable low latency communications (URLLC), massive machine type communications (MMTC), D2D communications,
V2X communications; Spectrum for 5G, spectrum access/sharing; millimeter Wave communication, channels and signals/waveforms in 5G, carrier aggregation, small cells, dual connectivity.
Unit-3 - 5G Network and Standards 9 Hour
New Radio (NR), Standalone and non-standalone mode; non-orthogonal multiple access (NOMA); massive MIMO, beam formation, FAPI: PHY API Specification, flexible frame structure,
Unit-4 - 5G Network protocols, SDN and NFV 9 Hour
Service Data Adaptation Protocol (SDAP); centralized RAN, open RAN; multi-access edge computing (MEC); software defined networking (SDN), network function virtualization (NFV); network slicing; restful API
for service-based interface; private networks.
Unit-5 - Current State and Challenges Ahead 9 Hour
5G penetration in developed countries; deployment challenges in low-middle income countries, stronger backhaul requirements, dynamic spectrum access and usage of unlicensed spectrum, contrasting radio
resource requirements; large cell usage: LMLC; possible solutions for connectivity in rural areas (BharatNet, TVWS, Long-range WiFi, FSO); non-terrestrial fronthaul/backhaul solutions: LEOs, HAP/UAV.

Learning 1. 4G, LTE-Advanced Pro and The Road to 5G by Erik Dahlman 3. Standards Hardcover – 1 June 2019 by Sassan Ahmadi Dr. (Author)
Resources 2. 5G NR: Architecture, Technology, Implementation, and Operation of 3GPP New Radio

70
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 30% - 30% - 30% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
Suggested by AICTE

71
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE451T PATTERN RECOGNITION TECHNIQUES E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: know about various techniques in pattern recognition 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: develop good knowledge of Bayesian Theory

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: explore the various non-Parametric techniques

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the Linear Discriminant functions

Environment &
Sustainability
CLR-5: utilize Artificial Neural networks for classification problems

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify the various techniques involved in pattern recognition 3 - - - - - - - - - - - 1 - -
CO-2: summarize Bayesian decision theory and Bayesian learning 3 2 - - - - - - - - - - 2 -
CO-3: categorize the various non-Parametric techniques 2 2 - - - - - - - - - - - 2 -
formulate appropriate Linear Discriminant Function, Nearest neighbor rule, Neural Network and SVM for the
CO-4: 3 2 - - - - - - - - - - - 2 -
problem statement
CO-5: demonstrate the Artificial Neural Network based Pattern recognition 3 - 2 - 2 - - - - - - - - - 2

Unit-1 - Introduction to Pattern Recognition Systems 9 Hour


Basics of Probability, Independence of events, Conditional and Joint probability, Machine perception, Pattern Recognition Systems, The Design cycle, Learning and Adaptation, Minimum-error-rate classification,
Classifiers, Discriminant functions, Decision surfaces, Normal density, and discriminant functions
Unit-2 - Parameter Estimation Methods 9 Hour
Maximum Likelihood Estimation, Bayesian Estimation, Bayesian Parameter Estimation: Gaussian case, Bayesian Parameter Estimation: General Theory, Problems of Dimensionality, Component Analysis and
Discriminants, Expectation-Maximization, Hidden Markov Model
Unit-3 - Non-Parametric Techniques 9 Hour
Density Estimation, Parzen Windows, K- Nearest Neighbor Estimation, The Nearest Neighbor Rule, Metrics and Nearest Neighbor classification, Fuzzy classification, reduced coulomb energy networks,
Approximations by series expansions
Unit-4 - Linear Discriminant Functions 9 Hour
Linear Discriminant Functions and Decision Surfaces, Generalized Linear Discriminant Functions, Two-category linearly separable case, Perceptron criterion functions, Relaxation procedures, Nonseparable
Behavior, Minimum Squared Error procedures, Linear Programming Algorithms, Support Vector Machines
Unit-5 - Multilayer Neural Networks and Nonmetric Methods 9 Hour
Introduction to Neural Networks. Multilayer Neural Networks: Feedforward operations and classification, Backpropagation algorithms, Nonmetric methods: Decision Trees, CART, Applications: Face recognition
System

72
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. R.O. Duda, P.E.Hart and D.G.Stork, Pattern Classification, John Wiley 2001 5. K. Fukunaga, Introduction to Statistical Pattern Recognition, 2nd Ed. Academic Press, New
2. S. Theodoridis and K.Koutroumbas, Pattern Recognition, 4th Ed., Academic Press, 2009 York, 1990.
Learning
3. C.M. Bishop, Pattern Recognition and Machine Learning, Springer, 2006 6. Wu, Jianxin. Essentials of Pattern Recognition: An Accessible Approach. United
Resources
4. P.A Devijver and J. Kittler, Pattern Recognition: A Statistical Approach, Prentice-Hall, Kingdom, Cambridge University Press, 2020.
International, Englewood Cliffs, NJ, 1980 7. Bengio, Y., Goodfellow, I., Courville, A. (2016). Deep Learning. United Kingdom: MIT Press.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Peter PethuruRaj, Jio Cloud, Bengaluru 1. Dr.S.Chithra, Associate Professor, SSN College of Engineering, Chennai 1. Dr.B.Baranidharan, SRMIST
2. Mr. Srivathsa Pasumarthi, Senior Research Scientist
Subtle Medical, Menlo Park,California, USA

73
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE452T SEMANTIC WEB E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic concepts of semantic web 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: analyze the Ontology terminologies

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: investigate the concepts of semantic web services

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: construct and map Ontologies

Environment &
Sustainability
CLR-5: apply semantic web knowledge using XML

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire knowledge about Semantic Web 3 2 - - 3 - - - - - - - 3 -
CO-2: recognize Ontology Terminologies - - 2 - 2 - - - - - - - - 3 -
CO-3: analyze the XML web services - 3 - 2 - - - - - - - - - 3 -
CO-4: apply Ontology concepts - - 3 - 2 - - - - - - - - 3 -
CO-5: design XML documents 2 - 3 3 - - - - - - - - - 3 -

Unit-1 - The Semantic Web 9 Hour


The Semantic Web: Introduction - Scenario - Layer Cake. Describing Data with RDF- properties - visualization, RDF Applications. Topic Maps - Introduction - Examples- Comparison with Web and RDF. Annotations
- Searching - Strategies. Logic - order – pitfalls
Unit-2 - Understanding Ontologies 9 Hour
Graphical ontology example: Human resources., Definitions-Syntax, Structure, Semantics, and Pragmatics- Ontology and Semantic Mapping Problem-Knowledge Representation: Languages, Formalisms, Logics-
Levels of Ontologies- OWL-Ontologies Today
Unit-3 - Semantic Web Services 9 Hour
Web Services-Invoking-Describing-finding services. Intelligent agents-Types-Interactions-Frameworks-Standards. Distributed trust and belief-tools of trust-
Unit-4 - Ontology Engineering 9 Hour
Constructing Ontologies Manually-Reusing Existing Ontologies-Semiautomatic Ontology Acquisition-Ontology Mapping-Exposing Relational Databases-Semantic Web Application Architecture
Unit-5 - Case Studies with XML 9 Hour
The XML Language-Structuring-Namespaces-Addressing and Querying XML Documents-Processing-Case Studies: Friend of a Friend-Browser Bookmarks-Crafting Your Company’s Roadmap to the Semantic Web

1. Thomas.B.Passin: Explorer's guide to the semantic web. Manning Publications Company 3. Grigoris Antoniou and Frank Van Harmelen, “A Semantic Web Primer”, the MIT Press,
Learning 2004, ISBN 978-1-932394-20-7, pp. I-XXII, 1-281 Cambridge, Massachusetts London, England, 2004.
Resources 2. Michael C, Daconta, Leo J. Obrst and Kevin T. Smith, “The semantic Web: A guide to the 4. www.semanticweb.org
future of XML, web services, and knowledge management”, ohn wiley & sons, 2003.

74
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 25% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. R Velmurugan Manager, Cognizant 1. Prof. Dr. J. I. Sheeba, Department of CSE, Puducherry Technological 1. Dr. Sindhu C, SRMIST
University, Pondicherry, India
2. Prof. Dr. K. Prasanth, Dept of IT, KSRCT, Tiruchengode, India 2. Mrs. R. Lavanya, SRMIST

75
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE453T SPEECH RECOGNITION E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basics of Acoustics and Phonetics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate the concepts of Chatbots and Dialogue systems

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: demonstrate the feature extraction process of speech recognition task

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: apply the deep learning architecture for speech recognition task

Environment &
Sustainability
CLR-5: analyzing and applying the transfer learning models for machine translation task

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: familiarize the concepts of acoustics and phonetics 3 2 - - - - - - - - - - - 3 -
CO-2: understand the applications of speech recognition 1 2 - - - - - - - - - - - 3 -
CO-3: identify the feature extraction process involved in speech recognition 3 - 3 2 - - - - - - - - - 3 -
CO-4: design and Develop the deep learning architecture 3 2 2 - - - - - - - - - - 3 -
CO-5: understand the recent technologies in machine translation process 2 - 2 - - - - - - - - - - 3 -

Unit-1 - Introduction to Acoustic Phonetics 9 Hour


Speech Sounds and Phonetic Transcription, Articulatory phonetics, Prosody, Acoustic Phonetics and Signals, Phonetic Resources
Unit-2 - Chatbots & Dialogue Systems 9 Hour
Properties of Human Conversation, Chatbots, GUS: Simple Frame-based Dialogue Systems, The Dialogue-State Architecture, Evaluating Dialogue Systems, Dialogue System Design
Unit-3 - Automatic Speech Recognition and Text-to-Speech 9 Hour
The Automatic Speech Recognition Task, Feature Extraction for ASR: Log Mel Spectrum, Speech Recognition Architecture, CTC, ASR Evaluation: Word Error Rate, TTS
Unit-4 - Deep Learning Architectures for Sequence Processing 9 Hour
Language Models Revisited, Recurrent Neural Networks, RNNs as Language Models, RNNs for other NLP tasks, Stacked and Bidirectional RNN architectures, The LSTM, Self-Attention Networks: Transformers,
Transformers as Language Models, Contextual Generation and Summarization
Unit-5 - Machine Translation and Encoder-Decoder Models 9 Hour
Language Divergences and Typology, The Encoder-Decoder Model, Encoder-Decoder with RNNs, Attention, Beam Search, Encoder-Decoder with Transformers, Some practical details on building MT systems, MT
Evaluation

76
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Daniel Jurafsky and James H Martin, "Speech and Language Processing: An introduction to 4. Ren, Y., Ruan, Y., Tan, X., Qin, T., Zhao, S., Zhao, Z., and Liu, T. Y. Fastspeech: Fast, robust
Natural Language Processing, Computational Linguistics and Speech Recognition”, Prentice and controllable text to speech. Advances in Neural Information Processing Systems 32.
Learning Hall, 2nd Edition, 2018. 2019.
Resources 2. L. Rabiner and B. H. Juang, Fundamentals of Speech Recognition, Prentice Hall, 1993 5. Sutskever, Ilya, Oriol Vinyals, and Quoc V. Le. Sequence to sequence learning with neural
3. Wang, Y. Skerry-Ryan, R.J., Stanton, D., Wu, Y.,Weiss, R.J.,Jaitly, N.,Yang, Z., Xiao,Y., networks arXiv 2014
Chen, Z. Bengio, S. and Le, Q.,Tacotron:Towards end-to-end speech synthesis.arXiv. 2017. 6. The Illustrated Transformer –Jay Alammar –Visualizing machine learning one oncept at a time

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. J.Balaji, Associate Manager,Allstate Solutions Pvt Ltd, 1. Dr Gautam Srivatsava, Brandon University, Cananda 1. Dr. R. Srinivasan, SRMIST
[email protected]
2. Mr Tamilanaban, IBM Software Labs, Bangalore 2. Dr.Subalalitha C.N, SRMIST

77
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE454T COMPUTER VISION E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce students the foundations of Image Processing Techniques 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the shape and region analysis

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the Hough Transform and its applications to detect lines, circles, ellipses

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the Three-dimensional image analysis techniques and Motion Analysis

Environment &
Sustainability
CLR-5: study some applications of computer vision algorithms

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: perform basic Point detection and Morphology 3 - - - - - - - - - - - - - -
perform shape analysis, implement boundary tracking techniques and a apply chain codes and other region
CO-2: 2 2 1 - - - - - - - - - 3 - -
descriptors
CO-3: apply Hough Transform for line, circle, and ellipse detections 3 2 1 - 1 - - - - - - - 3 - -
CO-4: apply 3D vision techniques Implement motion related techniques 2 - - - - - - - - - - - 3 - 2
CO-5: develop applications using computer vision techniques 2 - 1 1 1 - - - - - - - 3 - 2

Unit-1 - Image Processing Foundations 9 Hour


Image processing techniques - classical filtering operations - thresholding techniques - edge detection techniques - corner and interest point detection - mathematical morphology - texture.
Unit-2 - Shapes and Regions 9 Hour
Binary shape analysis – connectedness – object labeling and counting – size filtering – distance functions – skeletons and thinning – deformable shape analysis – boundary tracking procedures – active contours –
shape models and shape recognition – centroidal profiles – handling occlusion – boundary length measures – boundary descriptors – chain codes – Fourier descriptors – region descriptors – moment.
Unit-3 - Hough Transform 9 Hour
Line detection – Hough Transform (HT) for line detection – foot-of-normal method – line localization – line fitting – RANSAC for straight line detection – HT based circular object detection – accurate center location
– speed problem –ellipse detection – Case study: Human Iris location – hole detection – generalized Hough Transform (GHT) – spatial matched filtering – GHT for ellipse detection – object location – GHT for feature
collation.
Unit-4 - Vision and Motion 9 Hour
Methods for 3D vision – projection schemes – shape from shading – photometric stereo – shape from texture – shape from focus – active range finding – surface representations – point-based representation –
volumetric representations – 3D object recognition – 3D reconstruction – introduction to motion – triangulation – bundle adjustment – translational alignment – parametric motion – spline-based motion – optical flow
– layered motion.
Unit-5 - Applications 9 Hour
Application: Photo album – Face detection – Face recognition – Eigen faces – Active appearance and 3D shape models of faces Application: Surveillance – foreground-background separation – particle filters –
Chamfer matching, tracking, and occlusion – combining views from multiple cameras – human gait analysis Application: In-vehicle vision system: locating roadway – road markings – identifying road signs – locating
pedestrians.

78
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Richard Szeliski, Springer-Verlag London Limited 2011 6. Computer Vision: Algorithms and Applications,
2. E. R. Davies, ―Computer & Machine Visionǁ, Fourth Edition, Academic Press, 2012 7. Mark Nixon and Alberto S. Aquado, ―Feature Extraction & Image Processing for Computer Visionǁ,
3. D. L. Baggio et al., ―Mastering OpenCV with Practical Computer Vision Projectsǁ, Third Edition, Academic Press, 2012.]
Learning
Packt Publishing, 2012 8. Davies, E. R. (2017). Computer Vision: Principles, Algorithms, Applications,
Resources
4. Computer Vision: A Modern Approach, Forsyth, J. Ponce, Pearson Education, 2003 Learning. Netherlands: Elsevier Science.
5. Jan Erik Solem, ―Programming Computer Vision with Python: Tools and algorithms 9. Bhuyan, M. K. (2019). Computer Vision and Image Processing: Fundamentals and
for analyzing imagesǁ, O'Reilly Media, 2012.. Applications. United States: CRC Press.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 20% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. BharathKumar, Senior Software Developer, 1. Dr. K. Vivekanandan , Ph.D., Professor in Computer Science and 1. Dr M Suchithra, SRMIST
MalwareBytes, Estonia, [email protected] Engineering , Pondicherry Engineering College, Puducherry-605014,
[email protected]

79
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE455T SOCIAL NETWORK ANALYSIS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: familiarize the Concept of semantic web and the introduction to social network analysis 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: get familiar with the modeling and aggregating of data from social networks

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: explore the method of extracting and mining data from social network communities

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understanding and predicting human behavior for social communities

Environment &
Sustainability
CLR-5: acquire the ability to implement social networks and visualize its applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the concepts of semantic web and introduction of social network analysis 2 - 2 3 - - - - - - - - - 2 2
CO-2: understand and design the roles of ontology in the semantic web 2 - 2 3 - - - - - - - - - 2 2
CO-3: learn about the social network communities - 3 2 - 3 - - - - - - - - 2 2
CO-4: understand and predict the human behavior for social communities 2 - 3 - 3 - - - - - - - - 2 2
CO-5: design and implement the social network representations and visualize its applications 2 - 3 - 2 - - - - - - - - 2 2

Unit-1 - Introduction 9 Hour


Introduction to Semantic web: Limitations of current web, Development of Semantic web, Emergence of the Social Web, Social Network analysis, Components, Development of Social Network Analysis, Key concepts
and measures in network analysis, electronic sources for network analysis, Examples, Web-based networks, Examples with diagrams, Applications of Social Network Analysis, Examples
Unit-2 - Ontology and their Role in the Semantic Web 9 Hour
Roles of Ontology, Ontology-based knowledge Representation, Explanation of Diagram, Ontology languages for the Semantic Web, Resource Description Framework, Web Ontology Language, Examples, Modeling
and aggregating social network data, State-of-the-art in network data Representation, Aggregating, Advanced representations, Examples for Representations
Unit-3 - Extraction and Mining Communities in Web Social Networks 9 Hour
Extracting evolution of Web Community from a Series of Web Archive, Definition of Community, Examples for Community, detecting communities in social Networks, Examples for Detection of Communities,
Algorithms, Tools for detecting communities social network infrastructures and communities, Examples for various tools
Unit-4 - Predicting Human Behavior and Privacy Issues 9 Hour
User data management, Inference and Distribution, Enabling new human experiences, Reality mining, Context, Privacy in online social networks, Trust model example, Trust network analysis, Trust transitivity
Analysis
Unit-5 - Visualization and Applications 9 Hour
Graph theory, Centrality, Clustering, Node, Edge diagrams, Matrix representation, visualizing social networks with matrix-based representation, Matrix, Node, Link diagrams, Hybrid representations, Applications:
Cover networks, Community welfare, Collaboration networks, Co-Citation networks

80
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Peter Mika, “Social Networks and the Semantic Web”, First Edition, Springer 2007. 4. Dion Goh and Schubert Foo, “Social information Retrieval Systems: Emerging Technologies
2. Borko Furht, “Handbook of Social Network Technologies and Applications”, 1st Edition, and Applications for Searching the Web Effectively”, IGI Global Snippet, 2008.
Learning Springer, 2010. 5. Ian McCulloh, Helen Armstrong, and Anthony Johnson, “Social Network Analysis with
Resources 3. Guandong Xu, Yanchun Zhang and Lin Li, “Web Mining and Social Networking – Techniques Applications”, Wiley Publications, 2013.
and applications”, First Edition Springer, 2011. 6. Borgatti, S. P., Everett, M. G., & Johnson, J. C., “Analyzing social networks”, SAGE
Publications Ltd; 1 edition, 2013.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 25% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Muthukumarasamy S, Capgemini India Pvt Ltd,Chennai 1. Prof.Dr. Deivamani Mallaya, College of Engineering, Guindy, 1. Ms.Briskilal J, SRMIST.
Chennai.
2. Ms.Vijayalakshmi M, SRMIST.

81
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE456T SOFTWARE DEFINED NETWORKS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the fundamentals of software defined networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: explore different controllers of SDN

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: study about the SDN Programming

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: analyze the various applications of SDN

Environment &
Sustainability
CLR-5: express the various components of SDN and their uses

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: differentiate between traditional and software defined networks 1 - - - - 2 - - - - - - 2 - -
CO-2: associate appropriate Controllers for different applications - 1 - - - - - - - - - - 2 - -
CO-3: obtain skills to do advanced networking research and programming 2 - 1 - - - - - - - - - 2 - -
CO-4: learn how to use software programs to perform varying and complex networking tasks - 3 - - 1 - - - - - - - 2 - -
CO-5: explore the knowledge learned and apply it to solve real time problems - 1 3 - - - - - - - - 2 - -

Unit-1 - Introduction to SDN 9 Hour


Introduction - Evolution of SDN – Need for SDN - Centralized and Distributed Control and Data Planes - The Genesis of SDN Introducing Mininet - Setting up the Environment and Implementation of SDN Aspects
in Mininet
Unit-2 - SDN Abstractions 9 Hour
Working principle of SDN - Openflow Protocol, SDN Controllers: Introduction - General Concepts - VMware - Nicira - OpenFlow-Related - Mininet - NOX/POX - Trema - Ryu , Floodlight - Layer 3 Centric - Plexxi -
Cisco One PK ,Implementation of Custom Topologies in POX, ODL, Floodlight 3 Click, ONOS,Interfacing: Northbound – Southbound and East bound -West bound.
Unit-3 - Programming of SDN 9 Hour
Network Programmability - Network Function Virtualization - NetApp Development, Network Slicing, ONOS deployment ONOS – OPNFV
Unit-4 - SDN Applications and Use Cases 9 Hour
SDN in the Data Center - SDN in Other Environments - SDN Applications - SDN Use Cases - The Open Network Operating System 3
Unit-5 - SDN's Future and Perspectives 9 Hour
SDN Open Source - SDN Futures – SDN SECURITY- Switching and Load Balancers, Firewall and Access Control, Use cases in Legacy Networks security.

1. Software Defined Networks: A Comprehensive Approach by Paul Goransson and Chuck 4. Feamster, Nick, Jennifer Rexford, and Ellen Zegura. "The road to SDN: an intellectual
Learning Black, Morgan Kaufmann Publications, 2016 Reprint history of programmable networks." ACM SIGCOMM Computer Communication Review
Resources 2. SDN - Software Defined Networks by Thomas D. Nadeau & Ken Gray, O'Reilly, 2013 44.2 (2014): 87-98
3. Software Defined Networking with OpenFlow By SiamakAzodolmolky, Packt Publishing, 2013

82
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. P.Kumaran,Senior Engineer,CSS Corp , Navalur,Chennai 1. Dr. M. Sridevi, Associate Professor, Dept. of CSE, NIT, Trichy 1. Dr.B.Amutha, SRMIST
2. D.Dinesh Babu,Servion global solution private 2. D.Vanusha, SRMIST
limited,Software Engineer,Chennai
3. Dr.R.Thamizhamuthu , SRMIST

83
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE457T SERVICE ORIENTED ARCHITECTURE E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the main concepts, principles, needs and evolution of SOA 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand and apply patterns for service design from the provider and requester perspectives

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand SOA challenges mainly regarding governance, testing and maintenance

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the business case for SOA

Environment &
Sustainability
CLR-5: understand the best strategies and practices of SOA

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: comprehend the need for SOA and its systematic evolution 2 1 1 - - - - - - - - - 2 - -
CO-2: design and analyze various SOA patterns and techniques 2 1 1 - - - - - - - - - 2 - -
CO-3: create a best implementation model 3 2 3 - - - - - - - - 2 - -
CO-4: apply SOA technologies to enterprise domain 2 1 1 - - - - - - - - 2 - -
CO-5: implement the best strategies and practices of SOA 3 2 3 - - - - - - - - - 2 - -

Unit-1 - Introduction 9 Hour


Introduction: SOA and MSA Basics: Service Orientation in Daily Life, Evolution of SOA and MSA. Service oriented Architecture and Microservices architecture – Drivers for SOA, Dimensions of SOA, Conceptual
Model of SOA, Standards and Guidelines for SOA, Emergence of MSA Enterprise-Wide SOA: Considerations for Enterprise-wide SOA, Strawman Architecture for Enterprise-wide SOA, Enterprise SOA Reference
Architecture, Object-oriented Analysis and Design (OOAD) Process, Service-oriented Analysis and Design (SOAD) Process, SOA Methodology for Enterprise
Unit-2 - Analysis and Design 9 Hour
Service-Oriented Applications: Considerations for Service-oriented Applications, Patterns for SOA, Pattern-based Architecture for Service-oriented Applications, Composite Applications, Composite Application
Programming Model. Service-Oriented Analysis and Design: Need for Models, Principles of Service Design, Nonfunctional Properties for Services, Design of Activity Services (or Business Services), Design of Data
Services, Design of Client Services, Design of Business Process Services
Unit-3 - Technologies for SOA 9 Hour
Technologies for SOA: Technologies for Service Enablement, Technologies for Service Integration, Technologies for Service Orchestration. SOA Governance and Implementation: Strategic Architecture Governance,
Service Design-time Governance, Service Run-time Governance, Approach for Enterprise-wide SOA Implementation
Unit-4 - Big Data and SOA 9 Hour
Big Data and SOA: Concepts, Big Data and its characteristics, Technologies for Big Data, Service-orientation for Big Data Solutions. Business Case for SOA: Stakeholder Objectives, Benefits of SOA, Cost Savings,
Return on Investment (ROI), Build a Case for SOA
Unit-5 - SOA Best Practices 9 Hour
SOA Best Practices: SOA Strategy – Best Practices, SOA Development – Best Practices, SOA Governance – Best Practices. EA and SOA for Business and IT Alignment: Enterprise Architecture, Need for
Business and It Alignment, EA and SOA for Business and It Alignment

84
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Shankar Kambhampaty; Service - Oriented Architecture & Microservices Architecture: For 3. Thomas Erl; Service Oriented Architecture Concepts Technology & Design; Pearson
Enterprise, Cloud, Big Data and Mobile; Wiley; 3rd Edition; 2018; ISBN: 9788126564064. Education Limited; 2015; ISBN-13: 9788131714904.
Learning
2. Icon Group International; The 2018-2023 World Outlook for Service-Oriented Architecture 4. Guido Schmutz, Peter Welkenbach, Daniel Liebhart; Serrvice Oriented Architecture An
Resources
(SOA) Software and Services; ICON Group International; 1st Edition, 2017; ASIN: Integration Blueprint; Shroff Publishers & Distributors; 2010; ISBN-13: 9789350231081
B06WGPN8YD.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Umesh Goyal Senior Manager System Engineering - End 1. Dr J Selvin Paul Peter, SRMIST
User Computing at VMware

85
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE458T WIRELESS AND MOBILE COMMUNICATION E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: analyze the fundamental of transmission and cellular systems 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: apply skills in real time engineering problems and can have capability to evaluate the transmission errors

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: comprehend the concept of mobile network, transport layer and wireless technologies

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: differentiate the various types of cellular standard by their unique services

Environment &
Sustainability
CLR-5: grasp GSM.GPRS, Handover and Localization techniques, Apply skills in various Routing protocols

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply Wireless Technology concepts to Engineering problems related to communication 1 3 3 - - - - - - - - - 1 - -
CO-2: improve their knowledge on Digital and analog Modulation techniques 1 2 1 - - - - - - - - - 1 - -
CO-3: equip themselves familiar with principle of Mobile Communication 1 3 2 - - - - - - - - - 1 - -
CO-4: familiarize with Digital Cellular Standards 1 1 1 - - - - - - - - - 1 - -
CO-5: acquaint with routing protocols, Expose to the emerging wireless technologies 1 2 2 - - - - - - - - - 1 - -

Unit-1 - Introduction to Wireless Communication 9 Hour


Elements of wireless communication system- Frequencies for radio communication- Signals, Noise – Types of Noise- Introduction to modulation and demodulation- Signals in the modulation- Introduction to Analog
modulation schemes- Amplitude Modulation Frequency modulation- Phase Modulation Introduction to Analog modulation schemes- Amplitude Shift Keying Frequency Shift Keying Phase Shift Keying- BPSK, QPSK-
Multiplexing and multiple access techniques- Frequency-division multiplexing- Time-division multiplexing- Code-division multiplexing- Spread spectrum modulation- frequency hopping Spread spectrum- Direct
Sequence Spread spectrum
Unit-2 - Cellular Concept 9 Hour
Cell area- Signal strength- Cell parameter- Capacity of Cell- Co channel interference- Frequency reuse- Frequency reuse- Multiple Radio access protocols Frequency division Multiple Access- Multiple Radio access
protocols Frequency division Multiple Access- Multiple Access with Collision Avoidance- Space division Multiple Access Code division Multiple Access- Space division Multiple Access Code division Multiple Access-
OFDM- Variants of OFDM- Comparison of Multiple Access Technique
Unit-3 – Generation of Cellular Systems 9 Hour
Introduction to GSM- Frequency Bands and Channels- Frames in GSM- Planes and layers of GSM- Protocols- Localization and calling- Handoff – Short messaging system- GPRS EDGE- 3G CELLULAR Systems
MMS- 3G CELLULAR Systems MMS- Handover- Satellite System Infrastructure- GEO, LEO, MEO- Limitations of GPS- GPS Beneficiaries of GPS- 4G Cellular systems- 4G Standards (LTE/WiMax)
Unit-4 – Communication Protocols 9 Hour
Mobile IP- IP packet delivery- Tunneling – Reverse Tunneling- IPv6- DHCP- Tradition TCP- Congestion control- Classical TCP Snooping- Mobile TCPFast retransmit / Fast recovery- Transaction oriented TCP TCP
over 2.5/3G wireless Networks- Introduction to WAP WAP Architecture- Wireless Datagram Protocol Wireless Transaction Protocol- Wireless Session Protocol- Wireless Transport Layer Security- Wireless Markup
Language- Push Architecture

86
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 – Protocol Architectures and Standards 9 Hour
System Architecture- Protocol Architecture- MAC Layer and Management- 802.11a, 802.11b- HIPERLAN- Bluetooth Architecture- IEEE 802.15 IEEE 802.15.4-MANET characteristics ROUTING- AODV Routing
VANET Communications in VANET- Wireless Sensor Networks- RFID Technology Two tags of RFID- Wi-Fi Standards- WiMax Standards- Fem-to-Cell Network- Push-to-talk technology for SMS

1. Roy Blake, Wireless Communication Technology” CENGAGE learning, Sixth Indian reprint 2013. 6. G.I. Papadimitriou, A.S.Pomportsis, P.Nicopolitids, M.S.Obaidat, “Wireless
2. Dharma Prakash Agarwal, Qing-An Zeng, “Introduction to Wireless and Mobile Systems” CENGAGE Networks”, John Wiley and Sons, 2003
learning, First edition 2014 7. Upena Dalal, “Wireless Communication” Oxford University Press, First edition 2009.
Learning
3. Jochen Schiller, “Mobile Communications”, Addision Wesley, 2nd edition 2011. Kaveh Pahlavan & Prashant Krishnamurthy, “Wireless Networks” PHI 2002.
Resources
4. Singal TL, “Wireless Communication”, Tata McGraw Hill Education Private Limited 8. Martyn Mallick, “Mobile and Wireless Design Essentials”, Wiley Dreamtech India
5. G.I. Papadimitriou, A.S.Pomportsis, P.Nicopolitids, M.S.Obaidat, “Wireless Networks”, John Wiley Pvt.Ltd. 2014.
and Sons, 2003

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.V.Kavitha Associate professor,Kings Engineering college.Anna 1. Dr.V.Deeban Chakravarthy, SRMIST
University.chennai
2. Dr.Kadiyala Ramana, Associate professor, Chaitanya bharathi Institute 2. Dr.P.Kirubanantham, SRMIST
of Technology, Osmania University.Hyderabad.

87
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE459T WIRELESS SENSOR NETWORKS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic sensor network concepts 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: learn about various Medium Access Control Protocols

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: comprehend the strategies of various routing Protocols

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: gain the knowledge on Localization and Time Synchronization

Environment &
Sustainability
CLR-5: understand the concept of Middleware Services and Network Security

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the challenges of WSN 1 3 3 - - - - - - - - - 1 - -
CO-2: analyze the variation in different protocols and apply in real time scenario 1 2 1 - - - - - - - - - 1 - -
CO-3: identify the best Routing Strategies 1 3 2 - - - - - - - - - 1 - -
CO-4: apply and Analyze the importance of various Localization and Time Synchronization 1 1 1 - - - - - - - - - 1 - -
CO-5: iimplement an application using middleware architecture with advanced security features 1 2 2 - - - - - - - - - 1 - -

Unit-1 - Introduction to Wireless Sensor Networks 9 Hour


Motivation for a network of Wireless Sensor nodes - Sensing and sensors- Challenges and constraints- Node architecture- Sensing sub system- Processor sub system- Communication interfaces-- prototypes-
Application of Wireless sensors- WSN Tools- Overview and Limitations- Contiki -Introduction- Characteristics of Contiki WSN simulator- Sensor Network Programming- Challenges in Sensor Network Programming-
Node-Centric Programming
Unit-2 - MAC Protocols for WSN 9 Hour
Characteristics of MAC protocols in Sensor networks- Contention free MAC Protocols- MAC Protocols –Characteristics- Traffic Adaptive Medium Access- Y-MAC- Low energy Adaptive Clustering- Contention based
MAC Protocols- Sensor MAC- Timeout MAC and pattern MAC- Hybrid MAC Protocol- MAC protocols in ContikiOS simulator- Nullmac in Contiki simulator
Unit-3 - Routing Strategies 9 Hour
Routing Metrics- Flooding and Gossiping- Data-Centric Routing- Proactive Routing- On-Demand Routing- Hierarchical Routing- Location-Based Routing- QoS-Based Routing Protocols- Local Power Management
Aspects- Dynamic Power Management
Unit-4 - Localization and Time Synchronization 9 Hour
Clocks and the Synchronization Problem- Time Synchronization in Wireless Sensor Networks- Basics of Time Synchronization- Time Synchronization Protocols- Ranging Techniques- Range-Based Localization-
Range-Free Localization- Event-Driven Localization
Unit-5 - WSN Security and Middleware Services 9 Hour
Fundamentals of Network Security- Challenges of Security in Wireless Sensor Networks- Security Attacks in Sensor Networks- Protocols and Mechanisms for Security- Middleware Architecture- Data related
functions, Architecture- Existing middleware- MiLAN,IrisNet- AMF,DSWare- CLMF

88
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Waltenegus Dargie, Christian Poellabauer, ―Fundamentals of Wireless Sensor Networks, 5. C.S Raghavendra, Krishna M. Sivalingam, Taieb znati, ―Wireless Sensor Networksǁ,
Theory and Practiceǁ, Wiley Series on wireless Communication and Mobile Computing, 2011 Springer Science 2010.
2. Kazem Sohraby, Daniel manoli, ―Wireless Sensor networks- Technology, Protocols and 6. Bhaskar Krishnamachari, ― Networking Wireless Sensorsǁ, Cambridge University Press,
Learning
Applicationsǁ, Wiley InterScience Publications 2013. 2005
Resources
3. S. Swapna Kumar, "A Guide to Wireless Sensor Networks", kindle Edition, USP 7. https://anrg.usc.edu/contiki/index.php/Contiki_tutorials
publications,2017 8. file:///C:/Users/Administrator.RD27/Downloads/Fundamentals-of-Wireless-Sensor-
4. https://www.amazon.in/Guide-Wireless-Sensor-Networks-ebook/dp/B072R53JJM. Networks-Waltenegus- Dargie.pdf

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.J.Shelton Samson Vedharaj Head of Global Software 1. Dr. N. Radha, SSN College of Engineering, 1. Mrs.P.Renukadevi ,SRMIST
Application Support Digital and Technology Coats
2. Dr.N.Poongavanam Veltech Rangarajan Dr.Sagunthala R & D Institute 2. Mrs.R.Brindha , SRMIST
of Science and Technology,

89
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE460T NETWORK PROTOCOLS AND ALGORITHMS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
understand the layered architecture for communication networks and the specific functionality of the network Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
layer
CLR-2: gain knowledge on the need for network protocols, its functionality, and different architectures

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand fundamental basis of various algorithms in centralized and distributed point of view

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the various types of key routing protocols used in wireless networks

Environment &
Sustainability
CLR-5: gain knowledge on past experiences and prepare for next generation networks and routing

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the knowledge of conventional networks routing operations 1 2 - - - - - - - - - - 1 - -
CO-2: comprehend Router Architectures and IP Address Lookup Algorithms 2 1 - - - - - - - - - - 1 - -
CO-3: model and evaluate various routing techniques and protocols - 2 1 - - - - - - - - - 1 - -
CO-4: examine how different dimensions of routing differ for different types of networks - 2 1 - - - - - - - - - 1 - -
CO-5: analyze and evaluate various routing paradigms in next generation - 1 2 - - - - - - - - - 1 - -

Unit-1 - Introduction 9 Hour


ISO OSI Layer Architecture, TCP/IP Layer Architecture, Functions of Network layer, General Classification of routing, Routing in telephone networks, Dynamic Nonhierarchical Routing (DNHR), Trunk status map
routing (TSMR), real-time network routing (RTNR), Distance vector routing, Link state routing, Hierarchical routing
Unit-2 - TCP/IP Protocols 9 Hour
BOOTP, DHCP, DNS, Finger, FTP, HTTP, S-HTTP, IMAP and IMAP4, MIME (S-MIME), NAT, NNTP, POP and POP3, rlogin, RMON, SLP, SMTP, SNMP, SNMPv1, SNMPv2, SNMPv3, SNTP, TELNET, URL,
Whois (and RWhois), XMPP, X Window/X Protocol, RPC, ITOT, RDP, RUDP, TCP, UDP, BGP (BGP4),
Unit-3 - LAN Protocols 9 Hour
LAN Protocols: Ethernet: IEEE 802.3 Local Area Network protocols – Fast Ethernet: 100Mbps Ethernet (IEEE 802.3u)- Gigabit (1000 Mbps) Ethernet:IEEE 802.3z (1000Base-X) and 802.3ab (1000Base-T)- 10-
Gigabit Ethernet: IEEE 802.3ae and 802.3an – WLAN: Wireless LAN by IEEE 802.11 protocols – IEEE 802.11i: WLAN Security Standard – IEEE 802.1X: EAP over LAN(EAPOL) for LAN/WLAN Authentication and
Key Management – WPAN: Wireless Personal Area Network Communication Protocols – IEEE 802.15.1 and the Bluetooth for WPAN Communications – FDDI: Fiber Distributed Data Interface – Token Ring: IEEE
802.5 LAN Protocol – LLC: Logic Link Control (IEEE 802.2)- SNAP: SubNetwork Access Protocol – STP: Spanning Tree Protocol (IEEE 802.1D).
Unit-4 - WAN Protocols 9 Hour
WAN Protocols: ATM: Asynchronous Transfer Mode Reference Model and Protocols -SONET/SDH: Synchronous Optical Network and Synchronous Digital Hierarchy – EoS: Ethernet over SONET/SDH – BISDN:
Broadband Integrated Services Digital Network (Broadband ISDN) -ISDN: Integrated Services Digital Network – PPP: Point-to-Point Protocols – FTP: File Transfer Protocol – PAP: Password Authentication Protocol
– PoS:

90
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Network Security Technologies and Protocols 9 Hour
Kerberos: Network Authentication Protocol – RADIUS: Remote Authentication Dial In User Service – SSH: Secure Shell Protocol – L2F: Layer 2 Forwarding Protocol – L2TP: Layer 2 Tunneling Protocol – PPTP:
Point-to-Point Tunneling Protocol – DiffServ: Differentiated Service Architecture – GRE: Generic Routing Encapsulation – IPsec: Internet Protocol Security Architecture – IPsec AH: IPsec Authentication Header –
IPsec ESP: IPsec Encapsulating Security Payload – IPsec IKE: Internet Key Exchange Protocol – IPsec ISAKMP:

1. Jielin Dong, Network Protocols Handbook, 4th Edition, Javvin Press, 2007 3. Bruce Hartpence, Packet Guide to Core Network Protocols, OReilly Media, Inc., 2011.
Learning
2. Walter Y. Chen, Home Network Basis: Transmission Environments and 4. Ana Minaburo, Laurent Toutain, Local Networks, and the Internet: From Protocols to
Resources
Wired/Wireless Protocols, Prentice Hall, 2003. Interconnection, John Wiley, and Sons, 2011

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. AmarendraMohanty, AdvantagePro 1. Dr.Pradheepkumar, BITS, PILANI 1. Dr.S.Nagadevi, SRMIST
2. Mr. Saju G Nair, Senior Development Manager Kyndryl India Pvt Ltd. 2. Dr. P. Varalakshmi, Professor, MIT, AnnaUniversity, Chennai 2. Dr.R.Vidhya. SRMIST

91
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

UNDERGRADUATE/ INTEGRATED POST


GRADUATE DEGREE PROGRAMMES
(With exit option of Diploma)

(Choice Based Flexible Credit System)

Regulations 2021

Volume – 11B
(Syllabi for Computer Science and Engineering w/s in
Artificial Intelligence and Machine Learning Programme
Courses)

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

92
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Core Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

93
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC401J DEEP LEARNING TECHNIQUES C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: illustrate the basic concepts of deep learning 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: gain knowledge in optimization algorithms and dimensionality reduction

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: develop a broad understanding of word2vec models and Convolution Neural Network models

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: acquire knowledge in Transfer learning and Sequential Models

Environment &
Sustainability
CLR-5: implement the attention mechanism and advanced deep learning models

solutions

society

PSO-1

PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the basic concepts of deep learning - 3 - - - - - - 2 - - - - - 2
CO-2: compare the optimization algorithms and high dimensional data using reduction techniques - 2 - - - - - - 2 - - - - - 2
CO-3: implement word2vec models and Convolution Neural Network models - 3 - 2 - - - - 3 - - - - 2
CO-4: apply RNN and transfer learning to real world scenarios - 3 - 2 - - - - 3 - - - - - 3
CO-5: use deep learning models to solve real-world applications - 3 - 2 - - - - 3 - - 2 - - 3

Unit-1 - Introduction to Neural Networks 15 Hour


Biological neuron, Motivation from biological neuron, McCulloch Pitts Neuron, Perceptron, Perceptron learning Algorithm, Representation power of a network of perceptrons, Activation functions-Sigmoid, tanh,
ReLU, leaky ReLU, Sigmoid neuron, Gradient descent learning Algorithm, Representation power of multilayer Network of Sigmoid Neurons, Representation power of function: Complex functions in real world
examples, Feedforward Neural Networks, Learning parameters, output and loss functions of FFN Networks, Backpropagation learning Algorithm, Applying chain rule across in a neural network, Computing partial
derivatives w.r.t a weight
Unit-2 - Optimization 15 Hour
Limitations of gradient descent learning algorithm, Momentum based gradient descent, Nesterov accelerated gradient descent, AdaGrad, RMSProp, Adam learning algorithm, Stochastic gradient descent, Mini-batch
gradient descent, Bias Variance tradeoff, Overfitting in deep neural networks, Hyperparameter tuning, Regularization: L2 regularization, Dataset Augmentation and Early Stopping, Dimensionality reduction, Principal
Component Analysis, Autoencoders, Relation between PCA and Autoencoders, Regularization in Autoencoders
Unit-3 - Word2vec and Convolutional Neural Networks 15 Hour
One hot representation of words, Distributed representation of words, SVD for learning word Representations, Continuous bag of words model, Skip-gram model, Introduction to Convolution Neural Networks, Kernel
filters, the convolution operation with Filters, padding and stride, Max pooling and non-linearities, Classic CNNs architecture- The ImageNet challenge, Alex Net architecture, ZFNet, The intuition behind GoogleNet,
Residual CNN-ResNet architecture, DenseNet Architecture.
Unit-4 - Recurrent Neural Networks 15 Hour
Transfer Learning, Need for Transfer Learning, Applications of Transfer learning, Sequence Learning Problems, Recurrent Neural Networks, Backpropagation through time, Unfolded RNN, problem of exploding and
vanishing Gradients, Seq to Seq Models, how gates help to solve the problem of vanishing gradients, Long-Short Term Memory architectures, dealing with exploding gradients, Gated Recurrent Units, Encoder-
Decoder Models, and its applications.

94
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Attention Models & Generative Adversarial Networks 15 Hour
Language Modeling, Image Captioning, Machine Translation, Attention Mechanism, Attention over images, Hierarchical Attention, Monte Carlo Methods, Local Independencies in a Markov Network, Joint
Distributions, the concept of a latent variable, Restricted Boltzmann Machines, RBMs as Stochastic Neural Networks, Unsupervised Learning with RBMs, Setting up a Markov Chain for RBMs, Generative Adversarial
Networks- Architecture, Generative Adversarial Networks- Applications
Lab Experiments
Lab1: Apply MP Neuron and perceptron to solve a binary classification problem Lab 8: Implement LeNet for image classification
Lab2: Apply sigmoid neuron to solve a real-world classification / regression problem Lab 9: Implement ResNet for detecting objects.
Lab3: Build a FFN Network to solve a multi-class classification problem Lab 10: Transfer learning implementation using VGG16 model to classify images.
Lab4: Implement linear regression with stochastic gradient descent. Lab 11: Building a RNN to perform Character level language modeling
Lab5: Implement linear regression with stochastic mini-batch gradient descent and compare the results with Lab 12: Build a LSTM network for Named Entity recognition.
previous exercise. Lab 13: Neural Machine Translation with attention.
Lab 6: Optimizing neural networks using L2 regularization, Dropout, data augmentation and early stopping Lab 14: Case study on Scene Understanding using RBMs
Lab 7: Implement skip gram model to predict words within a certain range before and after the current word. Lab 15: Case study on generating examples for Image dataset using Generative Adversial Networks

1. Ian Goodfellow, Yoshua Bengio, Aaron Courville, Deep Learning, MIT Press, 2016. 6. NPTELcourse:DeepL earning, Prof.Mitesh M.
2. Stevens, Eli, Luca Antiga, and Thomas Viehmann. Deep learning with PyTorch. Khaprahttps://archive.nptel.ac.in/noc/courses/noc18/SEM2/noc18-cs41/
Learning Manning Publications, 2020. 7. MIT Deep Learning and Artificial Intelligence Lectures: https://deeplearning.mit.edu
Resources 3. Eugene Charniak, Introduction to Deep Learning, MIT Press, 2018. 8. Stanford course CS231n: Deep Learning for Computer Vision: http://cs231n.stanford.edu
4. Charu C. Aggarwal, Neural Networks and Deep Learning, Springer, 2018. 9. MIT's introductory course on deep learning methods: http://introtodeeplearning.com
5. Francois Chollet , Deep Learning with Python, Manning Publications, 2017

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Marriappan Vaithilingam, Senior Director of Engineering, 1. Dr. Lathaparthiban, Pondicherry University 1. Dr.Athira M Nambiar SRMIST
Fresh works

95
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC402P REPORT WRITING C PROFESSIONAL CORE
Code Name Category 2 0 0 2

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: employ an efficient process for planning and organizing information 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: communicate the information to those who need it

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: demonstrate an understanding of the ethical implications of decisions and actions

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: express themselves effectively, professionally, and persuasively both orally and in writing

Environment &
Sustainability
CLR-5: provide facts and results of an enquiry

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: illustrates the current professional practices and concepts of writing reports - - - 3 - - - - - - - - - - 1
CO-2: discover sensible decisions by employing logical and critical thinking - 2 - - - - - - - - - - - 1
CO-3: demonstrate the effective way of communications - - - - - - - 3 - - - - - - 2
CO-4: discuss about the competent in applying relevant techniques to commercial problems - 2 - 2 - - - - - - - - - - 2
CO-5: apply knowledge in ethical report writing - - - 2 - - - - - - - - - - 2

Unit-1 - Introduction 6 Hour


Preparing to Write, Define the audience for report writing, Types of Reports, Planning -brainstorming and mind mapping, Formatting guidelines, Components of a report, Text of report.
Assignment1: Define the problem of the proposal, learn the report types, and submit an assignment with all components of a report.
Unit-2 - Research Methodology 6 Hour
Defining the problem, Literature Review, Methodologies, and Findings Decision-Making Techniques, Collecting Appropriate Data, Analyzing Information and Interpreting Results, Effective Collaborative Writing,
Problem-Solving Skills, Oral Report Assignments.
Assignment 2: Do the survey on existing system of the proposal, Identify the data collections, and submit an assignment
Unit-3 - Communication 6 Hour
Communication Skills - Written Assignments, Oral Communication Activities: Class Discussions, Group Analysis of Problem Situations and Formal Oral Presentation, communication tools-Cloud-Based Collaboration
Apps
Assignment 3: Conduct an oral presentation to evaluate the communication skills
Unit-4 - Layouts 6 Hour
Technical knowledge: Logical sections, Cohesive subsections, Analyze and visual software packages, Data Storage and Retrieval, Layout and Proof-reading.
Assignment 4: Find the technologies to implement the problem defined
Unit-5 - Documentation 6 Hour
Scope of the work, Literature review, computational details, Results and Discussions, Figures and Tables preparation, Conclusions and future works, Bibliography, Appendices. Uses of plagiarism detection tools.
Case Study: Reports Writing for research proposals.
Assignment 5: Submit the complete project report with all components
96
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Phillip A. Laplante Technical Writing: A Practical Guide for Engineers, Scientists, and Nontechnical 4. Anne Winckel and Bonnie Hart “Report Writing Style Guide for Engineering
Professionals, Second Edition (What Every Engineer Should Know), July 2019 Students” School of Natural and Built Environments, University of South Australia,
Learning 2. Edith Cowan University. (n.d.). Report writing: Academic tip sheet [Fact sheet]. Retrieved from July 2002.
Resources https://intranet.ecu.edu.au/data/assets/pdffile/0018/20628/reportwriting. pdf 5. https://canvas.bham.ac.uk/courses/11845/pages/what-is-a-
3. McKeown, J. Newcastle Business School: Postgraduate students manual 2016 (5th Ed.). Retrieved report?module_item_id=355522
from GSBS6001 Blackboard course.

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Project Based Learning Report and Viva Voce Final Examination
Bloom’s
CLA-1 Average of unit test CLA-2 (20%) (0% weightage)
Level of Thinking
(20%) (60%)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - -- 15% - 15% - -
Level 2 Understand 25% - - 20% - 20% - -
Level 3 Apply 30% - - 25% - 25% - -
Level 4 Analyze 30% - - 25% - 25% - -
Level 5 Evaluate - - - 10% - 10% - -
Level 6 Create - - - 5% - 5% - -
Total 100 % 100 % 100 % -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Gowtham R, Senior Data Engineer, Mercedes Benz Research 1. Dr. Sindia, AP, NIT – Trichy, [email protected] 1. Dr. Sudha Rajesh, SRMIST
Development of India, [email protected]
2. Dr. Vidhyavathi Prasath, AP, Government arts college for
men, [email protected]

97
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Elective Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

98
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE271T PROGRAMMING IN JAVA E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce the fundamental concepts and programming environment 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: outline the Concepts of classes and IO streams

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: acquire Object oriented concepts like inheritance, reusability, and encapsulation

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn the custom exceptions and employ concurrency concepts

Environment &
Sustainability
CLR-5: exploit the power of advanced data structures and basic GUI design

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: summarize the knowledge of fundamentals of Java Programming 3 - 1 2 - - - - - - - - 1 1 -
CO-2: determine the type of constructor and class concepts used in OOPS based programming paradigms 3 2 - 2 - - - - - - - - 2 - -
CO-3: articulate the different concepts involved in information hiding and reusability techniques 3 2 1 - - - - - - - - - 3 2 -
CO-4: understand the different concepts of Exception Handling and Concurrency topics 3 2 1 - - - - - - - - - - - -
CO-5: acquire the integration of Collection Frameworks and GUI programming to product development 3 2 - 1 - - - - - - - 1 - - -

Unit-1 - Fundamentals of Java Technology and Programming 9 Hour


Java platform features, Java technologies-JSR, JCP, Data types, Key words, and Scoping rules, Automatic Type Conversion, Type Casting and Arrays, Operators Precedence & Associativity, Expression. Flow
control, enhanced for loop, switch statements, String handling
Unit-2 - Classes, Objects and Streams 9 Hour
Class fundamentals: Declaring objects, Assigning object reference variable, Methods & Method Signatures, Method with parameters, Variable arguments, I/O Basics: Byte stream& Character Stream, Getting user
input: Reading console input & Writing console output, Reading and Writing files, Command Line arguments, Constructors and its Types, this keyword, Garbage Collector, finalize() method, Overloading methods
and constructors, Using object as parameters, returning object in methods, recursion, Access control, static and final keyword, Nested and Inner classes.
Unit-3 - Information Hiding and Reusability 9 Hour
Inheritance basics, Using super, Method Overriding, Dynamic method dispatch, Abstract class, Using final with inheritance, Default Package, Path & Class Path Environment Variables, Package level access,
Importing Packages, Interface: Multiple Inheritance, Extending interface, Wrapper Class, Auto Boxing.
Unit-4 - Exception, Concurrency, Enumeration and Annotations 9 Hour
Exception handling mechanism, try/catch mechanism, Thread class & Runnable Interface, Inter Thread Communication, Synchronization of threads using Synchronized keyword and lock method, Thread pool and
Executors framework, Futures and callable, Fork-Join, Deadlock conditions, Enumeration, Annotations: basics of annotation.
Unit-5 - Generics, Collections Framework and GUI Programming 9 Hour
Generics: Basics, Collections Interfaces – Set, List, Queue, Collections Classes – Array List, Hash Set, Tree Set. Abstract Map, Hash Map, Tree Map, Introduction to GUI and its component basics

99
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Herbert Schildt, “The Complete Reference (Fully updated for jdk7)”, Oracle press Ninth Edition, 2014. 4. HerbertSchildt, “Java: A Beginner's Guide”, Eight Edition, Oracle Press, 2018.
Learning
2. Cay S. Horstmann, “Core Java Volume –I Fundamentals”, Prentice Hall, 11th Edition, 2018. 5. https://docs.oracle.com/javase/tutorial
Resources
3. Deitel&Deitel, “Java How to Program”, Prentice Hall, 10th Edition, 2016. 6. NPTEL Course: https://onlinecourses.nptel.ac.in/noc22_cs47/preview

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 35% - 30% - 30% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 25% - 30% - 30% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Jero Terrence, Assistant Consultant in Tata Consultancy Services, United Kingdom 1. Dr.R.Ganeshan, VIT Bhopal, Madhya Pradesh. 1. Dr.S.Amudha, SRMIST

100
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE272T GENETIC ALGORITHM AND ITS APPLICATIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand evolutionary computation and Genetic Algorithms 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: learn terminologies and operators of GA

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gain knowledge on advanced operators and techniques in GA and classification of Genetic Algorithms

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: acquire knowledge in Genetic Programming and Genetic Algorithm Optimization problems

Environment &
Sustainability
CLR-5: build the applications of Genetic Algorithms

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain knowledge on the basics of evolutionary computing and genetic algorithms 1 - - - - - - - - - - - 1 - -
CO-2: acquire knowledge on the GA terminologies and operators 1 - - - - - - - - - - - - -
CO-3: understand the advanced operators in Genetic Algorithm optimization problems 1 2 - - - - - - - - - - 2 - -
CO-4: apply the knowledge of Genetic algorithms using optimization problems on wireless networks 1 1 3 - - - - - - - - - 3 - -
CO-5: design and develop the GA-based application in different engineering fields 1 2 3 - - - - - - - - - - 1 -

Unit-1 - Evolutionary Computation and Genetic Algorithms 9 Hour


Introduction to genetic algorithms-The Historical Development of Evolutionary Computing, Genetic Algorithms and Genetic Programming, Features of Evolutionary Computation, Advantages of Evolutionary
computation, Genetic Algorithms-Biological background. Cell, Chromosomes, Genetics, Reproduction, and Natural selection, Search space, GA world, Evolution and optimization, Evolution and genetic algorithms,
Limitations of GA.
Unit-2 - GA Terminologies and Operators 9 Hour
Terminologies and operators of GA, Key elements, Individuals, Genes, Fitness, Populations, Data Structures, Breeding, Selection, Crossover, Mutation, and Replacement, Search Termination or Convergence
criteria, Best individual, Worst individual, Sum of fitness and Medium fitness, Genetic algorithms working mechanism: Building block hypothesis, A Macro mutation hypothesis. An adaptive mutation hypothesis, The
Schema theorem, Optimal allocation of Trials Implicit Parallelism, Advanced operators and techniques in GA, Convergence problems in GA
Unit-3 - Advanced Operators and Techniques in Genetic Algorithm 9 Hour
Introduction of advanced operators-Diploidy, Dominance and Abeyance, Multiploid, Inversion and Reordering, Order Crossover and Cycle crossover, Micro operators: Segregation and translocation, Duplications
and Deletion, Sexual determination, non-binary representation, multi-objective optimization, combined optimization and Knowledge-based techniques, Classification of GAs. Simple Genetic algorithms (SGA). Parallel
and distributed Gas, Master-slave, Fine-grained parallel GAs. Multiple-Deme Parallel Gas, Hierarchical Parallel algorithms. Hierarchical Genetic Algorithms: Crossover, Initialization heuristics, Remove sharp
algorithms, Adaptive GA., Initialization, Evaluation function, Selection operators, Crossover operators, and mutation operators, Independent sampling GA and Breeding Phase, Niched pareto genetic algorithm.
Unit-4 - Genetic Programming and Optimization Problems 9 Hour
Introduction to Genetic programming, Comparison of GP, and other algorithms. Genetic operators, Tree-based GP, Representation of GP, Attributes in GP, Steps and Characteristics of GP, Applications of Genetic
Programming, GA Optimization problems, Fuzzy optimization problems, Multi-objective Reliability Design Problem. Network and bicriteria reliability design, Combinatorial Optimization problems. Linear integer model,
Applications of combinatorial optimization methods, Network design and Routing problems, planning of passive optical networks, Packet switched networks, Optimal topological design of all terminal networks

101
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Applications of Genetic Algorithms 9 Hour
Applications of Genetic Algorithms, GA in network synthesis, Control systems engineering and Fuzzy based speed control of Brushless DC motor, Feature Selection in Machine learning using GA, Designing texture
filters with GA, GA based knowledge acquisition in Image Processing. Object localization in image using GA, Data mining applications such as feature selection in data mining, GA in intrusion detection, Applications
in wireless networks for topology planning. GA application in ATM network, VLSI design applications, Genetic Layout optimization using GA, Introduction to Particle Swarm Optimization (PSO) and Ant Colony
Optimization (ACO), Examples on PSO and ACO, Comparison of GA with PSO and ACO, Comparison of GA with PSO and ACO

1. S.N. Sivanandam and S.N. Deepa, "Introduction to Genetic Algorithms”, Springer, 2nd 3. Michael Negnevitsky, "Artificial Intelligence, A Guide to Intelligent Systems", Second edition
Learning edition (2008) ((2005))
Resources 2. Mitsuo Gen and Runwei Cheng, “Genetic Algorithms and Engineering Optimization”, 4. David E.Goldberg ,”Genetic Algorithms in search, Optimization & Machine Learning”, Pearson
John Wiley, Fourth edition (2010). Education,2001

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 30% - 20% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 20% - 30% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. K. Selvaraj, Caterpillar, Bangalore 1. Dr. A.P. Shanthi, CSE, Anna University, Chennai 1. Dr.R. Athilakshmi, SRMIST

102
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE291T INTRODUCTION TO COGNITIVE NEUROSCIENCE E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline the fundamental framework of brain and its function 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: explain the importance of neurons and their interconnections

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: illustrate the geography of living brain

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: introduce the functional overview of learning and memory, thinking and problem solving

Environment &
Sustainability
CLR-5: provide the insight of executing goals and social cognition

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire knowledge on mind-brain science and working memory 1 - - - - - - - - - - 1 2 - -
CO-2: understand the adaptation of neural arrays and coordinating neural sets 1 2 - - - - - - - - - 1 3 - -
CO-3: comprehend the usage of functional neuroimaging and the roles of brain regions 1 - - - - - - - - - - 1 1 - -
CO-4: apply the varieties of memories and find ways to use existing knowledge - 3 - 2 - - - - - - - 1 - 2 -
CO-5: analyze and perceive the mental state of others - 3 2 - - - - - - - - 1 - 2 -

Unit-1 - Mind and Brain Frameworks 9 Hour


An invitation to mind-brain science - Distance: seven orders of magnitude - Time: ten orders of magnitude - The need to make inferences - going beyond the raw observations - The importance of convergent
measures - The mind and the brain - Biology shapes cognition and Emotion - Cajal’s neuron doctrine: the working assumption of brain science - Pierre-Paul Broca and the localization of speech production - The
conscious and unconscious mind - The return of consciousness in the sciences - Classical working memory - Limited and large-capacity functions - The inner and outer senses - The central executive – Action -
Consolidation of short-term events into long-term memory.
Unit-2 - Neurons and their Interconnections 9 Hour
Real and idealized neurons - Excitation and inhibition - Neural computation - Working assumptions - Arrays and maps - Maps flow into other maps - Temporal codes: spiking patterns and brain rhythms - Choice-
points in the flow of information - Top-down or expectation-driven processing - Hebbian learning - Neural Darwinism: survival of the fittest cells and synapses - Symbolic processing and neural nets - Coordinating
neural nets - Functional redundancy.
Unit-3 - Imaging the Living Brain 9 Hour
Imaging the living brain - Brain recording: more and less direct measurements - The time-space tradeoff - Measuring electric and magnetic signals - Functional neuroimaging: a bold new world - New ways to measure
brain connectivity: diffusion tensor imaging - Conscious versus unconscious brain events - Correlation and causation.
Unit-4 - Learning and Memory, Thinking and Problem Solving 9 Hour
Learning and memory - A functional overview - Implicit and explicit memory - Electrically evoked autobiographical memories - Long-term potentiation and long-term depression: excitatory and inhibitory memory
traces - Consolidation: from temporary to permanent storage - Rapid consolidation: synaptic mechanisms, gene transcription, and protein synthesis - System consolidation: interaction between the medial temporal
lobes and neocortex - Varieties of memory - MTL in explicit learning and memory - Prefrontal cortex, consciousness, and working memory - Retrieval and metacognition - Thinking and problem solving - Explicit
problem solving - Mental workload and cortical activity - Using existing knowledge - Implicit thinking.

103
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Goals, Executive Control, Action, and Social Cognition 9 Hour
Goals, executive control, and action - Phylogeny and ontogeny - Function overview - Closer look at frontal lobes - Neuroimaging the executive brain - Frontal lobe dysfunction - A current view of organizing principles
of the frontal lobes - Social cognition: Perceiving the mental states of others - An organizing framework for social cognition - Mirror neurons and intention detection.

1. Cognition, Brain, and Consciousness: Introduction to Cognitive Neuroscience (2010), 4. Cognitive Science. B M Bly & D E Rumelhart (Ed) (1999) the new cognitive neurosciences. M S
Bernard J. Bears, Nicole M. Gage, Academic Press (2010) Gazzaniga (ed) (2000)
Learning
2. Quantum Models of Cognition and Decision, Jerome R. Busemeyer, Peter D. Bruza, 5. MIND, An Introduction to Cognitive Science, Paul Thagard, MIT Press, 2ndedition, 2005
Resources
Cambridge University Press (2014) 6. Cognitive Science, Jay Freidenberg and Gordon Silverman, SAGE, 2016.
3. Sternberg, Robert J., Cognitive Psychology, 4th ed., Cengage Learning India, 2008

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 25% - 25% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 20% - 25% - 25% -
Level 4 Analyze 10% - 10% - 10% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.V.Anbarasan, Senior Engineer, Nielsen IQ India Pvt. Ltd. 1. Dr.K.Jayashree, Professor, Department of Artificial Intelligence and 1. Dr. R. Babu, SRMIST
Data Science, Panimalar Engineering College, Chennai
2. Ms.A.Saranya, Application Development Team Lead,
Accenture India

104
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE311P ROBOT PROGRAMMING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce the fundamentals of robot programming 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: explain the fundamentals of Embedded programming

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: acquire knowledge for selection and calibration of sensors, actuator and how to interface with Robot

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the Robot operating system fundamentals

Environment &
Sustainability
CLR-5: understand the integration of Hardware controllers with ROS

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain the knowledge of robot building system 2 2 - - - - - - - - - - 1 - -
CO-2: create the program for robot - 2 - 3 - - - - - - - - 2 - -
CO-3: gain knowledge on the sensor signal calibration, and actuator control for interfacing with Robot - 2 - 3 - - - - - - - - - - 3
CO-4: obtain the insights of Robot Operating system - - - 3 - - - - - - - - - - 3
CO-5: design and program the robot for its intelligent operation - - - 3 - - - - - - - - 1 - 3

Unit-1 - Robot Fundamentals 9 Hour


Basic of Robots – Anatomy - Links and joints - Basic terminology- Accuracy, Repeatability, Resolution, Degree of freedom - Robot Movement: Pitch, Roll, Yaw - Mechanisms and transmission - Work volume - End
effectors.
Tutorial:
1. Study the anatomy of Robot and create a Robot structure for pick and place operation.
2. Problems on Degrees of Freedom, understanding robot work space and movement.
Unit-2 - Embedded Programming 9 Hour
Basic Embedded File system – hex files - Simulators and Emulators - Integrated development environments - commonly used IDE. Basics of Embedded C for Robot Programming –. Python for Robot Programming
- Program structure, data types, control structure.
Practice:
1. Understanding file system and using IDE.
2. Create a Embedded C program for I/O operation.
Unit-3 - Robot Programming Interface 9 Hour
Sensor- Principle of sensors - Analog signal - Digital signal - I/O of Sensors – Calibration of sensors – Interfacing -Serial - I2C. Actuator – Types – I/O of Actuator, Direct control, and speed control, PWM, analog
control. Programming and interfacing of sensors. Programming and interfacing of actuators.
Practice:
1. Interfacing of sensor and calibration.
2. Interfacing of motor and control of motors.
105
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Robot Operating System 9 Hour
ROS Basics- Sensors and Robots Supporting ROS - ROS Architecture and Concepts - ROS File system - ROS Computation Graph Level, ROS Community Level - Creating ROS Workspace and Package, Using
ROS Client Libraries, Programming Embedded Board using ROS - Interfacing Arduino with ROS, ROS on a Raspberry Pi.
Practice:
1. Serial and I2C communication.
2. Programming with Raspberry Pi.
Unit-5 - Building the Robots 9 Hour
Introduction to Wheeled Robot - Building Robot Hardware - Block Diagram and Assembling Robot Hardware - Programming Robot Firmware - path planning. Case study: Tetrix – NAO – Ned Niryo – Auto Auto.
Practice:
1. Programs of Tetrix and NAO.
2. Programs on Ned Niryo and Auto Auto.

1. Mikell P. Groover, "Industrial Robotics", McGraw Hill, 2nd edition, 2012 4. Jonathan Cacace; Lentin Joseph, Mastering ROS for Robotics Programming: Design, build, and
2. Lentin Joseph, Robot Operating System (ROS) for Absolute Beginners: Robotics simulate complex robots using the Robot Operating System, 2nd Edition, Packt Publishing, 2018.
Learning
Programming Made Easy, 1st Edition, APress, 2018. 5. John J. Craig, “Introduction to Robotics”, 3rd Edition, Addison Wesley, ISE 2008.
Resources
3. Mark Siegesmund, “Embedded C Programming Techniques and Applications of C 6. Jacob Fraden, “Handbook of Modern Sensors”, Springer 2016
and PIC® MCUS”, Newnes, 2014 7. W. Bolton, “Mechatronics”, Pearson, 2018

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Project Based Learning Report and Viva Voce Final Examination
Bloom’s
CLA-1 Average of unit test CLA-2 (20% weightage) (0% weightage)
Level of Thinking
(20%) (60%)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - -- 15% - 15% - -
Level 2 Understand 25% - - 20% - 20% - -
Level 3 Apply 30% - - 25% - 25% - -
Level 4 Analyze 30% - - 25% - 25% - -
Level 5 Evaluate - - - 10% - 10% - -
Level 6 Create - - - 5% - 5% - -
Total 100 % 100 % 100 % -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rijo Jackson Tom Lead Data Scientist Augusta hitech 1. Dr. Thiyagarajan R Assistant Professor, Department of Mechanical 1. Dr.J.J. Jayakanth, SRMIST
soft solution Engineering, Indian Institute of Technology Tirupati

106
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE312P SOFTWARE ENGINEERING IN ARTIFICIAL INTELLIGENCE E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the different GPU Components 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: know to access NGC Containers and docker images

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: utilize the Pytorch and Juypter notebook

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn the CUDA ecosystem

Environment &
Sustainability
CLR-5: explore the DL deployments

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: distinguish the different components in GPU systems - 1 - - - - - - - - - - - - -
CO-2: create environments to work with different NGC container packages - 2 3 - - - - - - - - - 2 - -
CO-3: implement codes using jupyter notebook and pytorch - 3 3 - - - - - - - - - - 2 3
CO-4: develop and work with CUDA - 3 3 - 3 - - - - - - - - - 3
CO-5: visualize different DL deployments for various scientific applications - 2 - - 3 - - - - - - - - - -

Unit-1 - Introduction to System Software Engineering 9 Hour


System S/W Platforms: Virtualization, Containerization- Introduction to NVIDIA NGC Cloud, DockerHub
T1: Accessing DGX A100
T2: Working DOCKER Images and NGC Container
T3: Installation and Pulling Specific NGC Packages
Unit-2 - Scheduling and Resource Management 9 Hour
Introduction to Schedulers/Orchestration Tools - Fundamentals of Ansible/Kubernetes/KubeFlow/SLURM
T4: Implementing and executing Kubernetes
T5: Working with Ansible
T6: Demo Executions on Kubeflow/SLURM
Unit-3 - Introduction to IDE / Exploratory Programming 9 Hour
Introduction to various IDE like VSCode/PyCharm/Others-Introduction to Jupyter-Ecosystem for Exploratory Programming- Features of Jupyter-Ecosystem for building Python Packages/Scientific Manuscript
T7: Working with VScode/ Pycharm
T8: Using Jupyter note and PyTorch
T9: Run a simple data centric application using Jupyter note.

107
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - System Software for Accelerated Computing 9 Hour
ML/DL/DS/HPC Workloads-Overview of CUDA Platform: GPGPU Computing Platform - Overview of CUDA-X Platform: cuBLAS/cuDNN/cuTensor [Compute]- Framework for Differential Computation
T10: Testing the GPGPU Computing
T11: Testing and working with Tensor (CUDA-X)
T12: Implementing Mixed Precision and Quantization Aware training
Unit-5 – GPU Programming 9 Hour
Distributed Computing Software Stack-Multi-GPU/Multi-Node: [MPI/NCCL/RDMA] Horovod- Accelerating DL Deployments- MLOps: Hands-on
T13: Accelerating Neural Network Inferencing: TensorRT & Triton Inference Server
T14: Monitoring load Balancers & Schedulers
T15: Deployment of various services for monitoring, jupyter environment and other services.

1. Ekman, M., 2021. Learning Deep Learning: Theory and Practice of Neural Networks, Computer 3. Christopher Love, Jay Vyas, Core Kubernetes, 2022
Learning Vision, NLP, and Transformers Using TensorFlow. Addison-Wesley Professional. 4. Chollet, F., 2021. Deep learning with Python. Simon and Schuster.
Resources 2. Sanders, J. and Kandrot, E., 2010. CUDA by example: an introduction to general-purpose GPU
programming. Addison-Wesley Professional.

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Project Based Learning Report and Viva Voce Final Examination
Bloom’s
CLA-1 Average of unit test CLA-2 (20% weightage) (0% weightage)
Level of Thinking
(20%) (60%)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - -- 15% - 15% - -
Level 2 Understand 25% - - 20% - 20% - -
Level 3 Apply 30% - - 25% - 25% - -
Level 4 Analyze 30% - - 25% - 25% - -
Level 5 Evaluate - - - 10% - 10% - -
Level 6 Create - - - 5% - 5% - -
Total 100 % 100 % 100 % -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. A.G.Rangaraj,Deputy Director (Technical),R&D, RDAF and 1. Dr.I.Joe Louis Paul, Associate Professor, SSN College of Engineering 1. Dr.Kottilingam K, SRMIST
SRRA Division, National Institute of Wind Energy (NIWE)

108
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE313P ACCELERATED DATA SCIENCE E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the different GPU Components 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: know to work with GPUs for Accelerated Data Sciences

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: utilize CUDA and RAPIDS for Accelerated Data Science and Array Computing

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn and work with Data Wrangling and Machine learning

Environment &
Sustainability
CLR-5: explore the cuSignal worklets

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: distinguish the different components in GPU systems 1 1 - - - - - - - - - - 1 - -
CO-2: create environments to work with different packages for data science environments - 2 - - - - - - - - - - - - 2
CO-3: implement codes using CUDA and RAPIDS for Data Science and Array Computing - - - 3 - - - - - - - - - - 2
CO-4: develop and work with cuML and RAPIDS Memory manager - - - 3 - - - - - - - - - - 2
CO-5: working with cuSignal - - - 3 - - - - - - - - - - 2

Unit-1 - Introduction to GPU Systems 9 Hour


Introduction to GPU and DGX A100, Accessing DGX A100, Working DOCKER Images and NGC Container, Installation and Pulling Specific NGC Packages
Unit-2 - GPUs for Data Sciences 9 Hour
Introduction to Data Science Packages in Python Ecosystem: NumPy, Pandas, Scikit-Learn, SciPy, NetworkX- Overview of Jupyter Environment, GPU Accelerated Data Science Workflow with RAPIDS, Data
Preparation- NVTABULAR, ETL for RecSys-Model Training and XGBoost: Distributed XGBoost with DASK Visualization- cuXFilter
Unit-3 – CUDA and RAPIDS 9 Hour
Accelerated Data Science and Array Computing, CUDA and GP-GPU Computing, RAPIDS: GPU Accelerated Data Science Python Ecosystem, CuPy, cuDF, cuML, cuSignal,cuGraph, Deep-Dive: CuPy & Numba
for accelerated Array Computation- Dask: Distributed Array Processing Scheduler, Multi-GPU training
Unit-4 - Accelerated Data Wrangling and Machine Learning 9 Hour
GPU Accelerated Data Wrangling using cuDF- RAPIDS Memory Manager & NVTabular, Hands-on practical labs on cuDF with practical problem statement & benchmarking, GPU Accelerated Machine Learning
using cuML -Hands-on pratical on cuDF + cuML on a practical problem statement & benchmarking
Unit-5 - Accelerated Signal Processing 9 Hour
GPU Accelerated Signal Processing using cuSignal, Hands-on practical on cuSignal, Hands-on practical on cuSignal + Dask on a practical problem statement & benchmarking

1. Goodfellow, I., Bengio, Y. and Courville, A., 2017. Deep learning (adaptive computation 3. Christopher Love, Jay Vyas, Core Kubernetes, 2022
Learning
and machine learning series). Cambridge Massachusetts, pp.321-359. 4. Chollet, F., 2021. Deep learning with Python. Simon and Schuster.
Resources
2. Ng, A., 2017. Machine learning yearning. URL: http://www. mlyearning. Org/ (96), 139.

109
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Formative Project Based Learning Report and Viva Voce Final Examination
Bloom’s
CLA-1 Average of unit test CLA-2 (20% weightage) (0% weightage)
Level of Thinking
(20%) (60%)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - -- 15% - 15% - -
Level 2 Understand 25% - - 20% - 20% - -
Level 3 Apply 30% - - 25% - 25% - -
Level 4 Analyze 30% - - 25% - 25% - -
Level 5 Evaluate - - - 10% - 10% - -
Level 6 Create - - - 5% - 5% - -
Total 100 % 100 % 100 % -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Thamaraiselvam S, Zoho Corporation Private Limited, 1. T. Sudhakar Associate professor School of computer science and 1. Dr. K. Kottilingam SRMIST
Estancia IT Park, Guduvancherry, Tamil Nadu-603202 engineering VIT-AP University
2. Dr.N. Arivazhagan, SRMIST

110
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE323T MARKETING ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn to build brand architecture on brand value 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: know to create functions to access and manipulate numbers, strings and date time data

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: know the emphasis on scaling for brands

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: utilize the information for strategic marketing alternatives

Environment &
Sustainability
CLR-5: explore the experiments for digital marketing efforts

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: analyse user Generated Contents - - - - - - - 3 - 3 - - 1 - -
CO-2: analyse the digital products - - - - - - - 3 - 3 - - 2 - -
CO-3: understand customer Lifetime Value - - - - - - - - - - - - - 2 -
CO-4: analyse the marketing with ML models - - - - - - - 3 - - - - 2 - -
CO-5: communicate with digital analytics - - - - - - - - - 3 - - - - -

Unit-1 - User Generated Contents 9 Hour


Marketing Analytics, Data for Marketing Analytics, Business Intelligence, Analytics, and Data Science, Analysis, Exploratory Data Analysis, Descriptive Analysis, Predictive Analytics, Prescriptive Analytics, Benefits
of Customer Analytics, Factors Essential for Obtaining Benefits from Customer Analytics, Segmentation Analytics, Cluster Analysis.
T1: Data for Marketing Analytics
T2: Predictive Analysis
T3: Segmentation and cluster analysis
Unit-2 - Product Analysis 9 Hour
Product Analytics, Perceptual Mapping, White Spaces, Umbrella Brands, Multidimensional Scaling, Analyzing Digital Products, Analyzing Non-Digital Products,
T4: Product analysis
T5: Multimodel scaling
T5: Digital and Non - digital Products
Unit-3 - Customer Lifetime Value 9 Hour
Customer Lifetime Value (CLV), Calculating CLV, Understanding the CLV Formula, Applying the CLV Formula, Extending the CLV Formula, Using CLV to Make Decisions, A Forward-Looking Measure.
T7: Customer Lifetime Value (CLV)
T5: Applying the CLV Formula,
T6: Using CLV to Make Decisions

111
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Market Analysis 9 Hour
Market Mix Modeling, Variables in Market Mix Modeling, Techniques of Market Mix Modeling, Metrics for Tracking Customer Experience, Upgrading Customers: Use Case of Upselling, Logistic Regression Analysis,
Use of Logistic Regression as a Classification Technique
T10: Regression Analysis
T11: Multivariable Regressions
T12: Marketing Mix Models
Unit-5 - Digital Analytics 9 Hour
Search Engine Marketing, Search Engine Optimization, Social Media Analytics, App Marketing Metrics, Importance of AI in Marketing, Random Forests, Model Evaluation Using ROC, AUC, and Confusion Matrix,
Simple Feed-Forward Network, Deep Neural Network, Recommendation Systems, Necessity of Data Visualization, Visualizations Useful with Common Data Science Techniques
T13: Search Engine Marketing
T14: AI in Marketing
T15: Data Visualization Techniques

1. Seema Gupta, Avadhoot Jathar,” Marketing Analytics”, ISBN: 9789354242625 4. Fok Dennis (2003), “Advanced Econometric Marketing Models”, ERIM, ISBN 90–5892–049-6
2. Brea Cesar (2014), “Marketing and Sales Analytics: Proven Techniques and Powerful 5. Mireles Carlos Hern ́andez (2010), “Marketing Modeling for New Products”, ERIM, ISBN 978-90-
Learning
Applications from Industry Leaders”, FT Press, ISBN-0133761711 5892-237-3
Resources
3. Emmett Cox (2012), “Retail Analytics: The Secret Weapon”, Wiley, ISBN- 978-1-118- 6. Rackley Jerry (2015), “Marketing Analytics Roadmap: Methods, Metrics, and Tools”, Apress, ISBN-
09984-1 1484202597

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.K.Jafar Ali MBA, Ph.D. Consultant, iSpark Learning 1. Angeline Gautami Fernando, Associate Professor (Marketing & 1. Dr. R. Rajkumar, SRMIST
Solutions, Chennai. Analytics) at Great Lakes Institute of Management

112
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE326T ARTIFICIAL NEURAL NETWORKS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the biological background and basic concepts of neural networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: gain knowledge about perceptron and back propagation

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: know about various training rules and error minimization

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn the concepts of unsupervised neural networks

Environment &
Sustainability
CLR-5: explore the fine-tuning procedures and case studies for designing neural network models

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: explain the basic concepts of neural networks - - - - - - - - - - - - 1 - -
CO-2: describe perceptron and back propagation - - - - - - - - - - - - - 2 -
CO-3: apply various training rules in neural networks - - - - - - - - - - - - 2 - -
CO-4: explain unsupervised neural networks - - - - - - - - - - - - - - 2
CO-5: fine tune the neural networks - - - - - - - - - - - - - - 1

Unit-1 - Introduction to Neural Networks 9 Hour


History of neural network research- Biological inspiration: Neural computation, Models of computation, Elements of computing models- Network of neurons: structure, Information processing at neurons and synapses,
Information storage, Neurons as self-organizing systems- Artificial Neural Networks: Network of primitive functions, approximation of functions- Neuron Model: Single and multiple input neurons, Transfer functions-
Network architectures: Single layered and multi layered neurons, Recurrent Networks
Tutorials:
1. Implement various neural network architectures
2. Implement and study the effect of various activation functions
Unit-2 - Perceptron 9 Hour
Introduction to Perceptron- Perceptron Architecture: Single Neuron Perceptron, Multi Neuron Perceptron- Perceptron learning rule: Constructing Learning rules, Unified Learning rule, Training multi neuron perceptron-
Complexity of perceptron learning-Computational Limits of Perception-Linearly separable functions- Learning XOR-Feed forward Networks- Back propagation: Chain of rule Calculus, Back-Propagation Computation
in Fully-Connected Multi-layer Perceptron
Tutorials:
1. Implement Feed forward networks
2. Implement back propagation

113
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-3 - Learning and Training 9 Hour
Paradigms of Learning - Using training samples - Gradient Optimization Procedure- Batch Gradient Descent, Stochastic Gradient Descent, Mini-Batch Gradient Descent - Hebbian learning rule – Delta learning rule-
Convergence and local minima, representational power of feed forward networks, hypothesis search space and inductive bias, generalization, overfitting and stopping criterion-Error functions, Error minimizing
procedures-Hebbian learning
Tutorials:
5. Implementation of gradient descent
6. Implementation of delta learning rule
Unit-4 - Unsupervised Neural Networks 9 Hour
Unsupervised learning in neural networks: Hebbian learning rule, Principle Component Learning, Learning Vector Quantizer-I- Self Organizing Maps: Functionality, Training, Topology Function, Decreasing Learning
Rate, Variations of SOMs, Neural gas, Multi-SOM, Multi-neural gas, Growing neural gas- Adaptive Resonance Theory, Orienting subsystems, Learning Laws
7. Implementation of Principle Component analysis
8. Implementation of Self Organizing Maps
Unit-5 - Tuning the Neural Networks 9 Hour
Pretraining the model: Data selection, Preprocessing, Selection of network architecture- Training the network: Initializing weights, Choice of training algorithm, stopping criteria, Choice Of performance function,
Committees of Networks-Post Training Analysis: Fitting, Pattern Recognition, Clustering- Time delay and Recurrent Neural Networks-Case Studies: Smart Sensor system with function approximation- Myocardial
Infarction Recognition using pattern recognition-Forest cover problem using Clustering

1. Martin T. Hagan, Neural Network Design, 2nd edition. 4. Andries P., Computational Intelligence: An Introduction, Second Edition, Wiley, 2007
Learning
2. Tom M. Mitchell, Machine Learning, McGraw-Hill Education (India) Private Limited. 5. David Kriesel, A Brief Introduction to Neural Networks, 2009
Resources
3. Ian Goodfellow, Yoshua Bengio, and Aaron Courville, Deep Learning, MIT Press, 2016

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Sharanya, SRMIST

114
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE371T ADVANCED ALGORITHMS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: interpret the recurrence relations for analyzing the algorithms 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: classify various algorithmic techniques for appropriate applications and problems

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: evaluate the worst-case, average-case, and best-case analysis of various algorithms

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: illustrate string matching algorithms

Environment &
Sustainability
CLR-5: understand the purpose of different randomized, approximation and Geometric Algorithms

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: analyze the performance of algorithms - 2 - - - - - - - - - - - - 2
CO-2: choose appropriate data structures and algorithm design methods for a specified application - 2 - - - - - - - - - - - - 1
CO-3: assess the case analysis of various algorithms - - - 1 - - - - - - - - - - 2
CO-4: infer the performance of string-matching algorithms - - - 2 - - - - - - - 1 - 1
CO-5: compare and contrast various randomized, approximation and Geometric Algorithms - 2 - - - - - - - - - - - - 2

Unit-1 - Introduction to Algorithm Analysis 9 Hour


Role of algorithms in computation, Notation order, Recurrences, Probabilistic Analysis, Statistics of Sorting, and its order notations: Heap Sort and Quick Sort in Linear time and space, Dynamic Programming: Matrix
Chain Multiplication, Operations on Polynomials, DFT & FFT Algorithms, longest common Subsequence, and optimal binary Search trees
Unit-2 - Graph Algorithms and Network Flow 9 Hour
Greedy Algorithms - Huffman Codes, Activity Selection Problem, Amortized Analysis. Graph Algorithms - Topological Sorting, Minimum Spanning trees, Single Source Shortest Paths, Maximum Flow algorithms,
Augmenting Paths, and Push-Relabel Methods. Network Flow – Ford-Fulkerson Algorithm, Push-relabel algorithm, Maximum bipartite matching, and Hopcroft-Karp algorithm. Parallel Algorithms – PRAM, Pointer
Jumping and Parallel Prefix, Tree Contraction, Randomized Symmetry Breaking, Maximal Independent Set. Case Study: Finding the shortest path between two cities using Travelling salesperson problem
Unit-3 - Sorting Networks and Matrix Operations 9 Hour
Sorting Networks: Comparison Networks, Zero-one principle, Bitonic Sorting Networks, Merging Network, Sorting Network. Matrix Operations- Strassen's Matrix Multiplication, inverting matrices, Solving system of
linear Equations
Unit-4 - String Matching and Randomized Algorithms 9 Hour
String Matching - Naive String Matching, Rabin-Karp algorithm, Matching with finite Automata, Knuth- Morris - Pratt algorithm, Suffix Trees. Randomized Algorithms – Mathematical Background, Introduction and
analysis, Monte Carlo Algorithms, Las Vegas Algorithms, Atlantic City Algorithms, Computational Complexity
Unit-5 - Approximation Algorithms and Linear Programming 9 Hour
Polynomial time, polynomial time verification, NP-Completeness and reducibility, NP-Complete problems. Approximation Algorithms- Vertex cover Problem, Travelling Sales person problem, Set Vector and Subset
Sum. Geometric Algorithms – Preliminaries, Convex Hull, Segment Intersection, Closest Pair, Voronoi-Delaunay diagrams, Flip algorithm. Linear Programming – Framework, Formulation of Problems as Linear
Programs. Duality. Simplex, Interior Point, and Ellipsoid Algorithms. Case Study : Types of algorithms used for finding convex hull for any given area

115
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Introduction to Algorithms,'' T. H. Cormen, C.E. Leiserson, R. L. Rivest, and C. Stein, Third 4. Algorithm Design: Foundations, Analysis and Internet examples, M.T. Goodrich and R.
Edition, PHI. Tomassia, John Wiley and sons
Learning 2. Fundamentals of Computer Algorithms, Ellis Horowitz, Satraj Sahni and Rajasekharam, 5. Data structures and Algorithm Analysis in C++, Allen Weiss, Second edition, Pearson
Resources Galgotia publications pvt. Ltd education.
3. Design and Analysis Algorithms - Parag Himanshu Dave, Himanshu Bhalchandra Dave 6. Cormen, Leiserson, Rivest, and Stein. Introduction to Algorithms. 2nd ed. Cambridge, MA:
Publisher: Pearson MIT Press, 2001. ISBN: 0262032937.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 10% - 20% -
Level 2 Understand 20% - 10% - 20% -
Level 3 Apply 30% - 40% - 30% -
Level 4 Analyze 30% - 40% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Bragadeesh SA, Associate Analyst, Infosys PvT Limited 1. Mr. Mani Deepak, PGP College of Engineering, Coimbatore 1. Mrs. Akshya J, SRMIST

116
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE375T COMPUTATIONAL NEUROSCIENCE E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: know What happens in your brain when you make a decision 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
gain knowledge mathematical and computational models that are used in the field of theoretical

The engineer and society


CLR-2:

Conduct investigations of

Individual & Team Work


Engineering Knowledge
neuroscience

Design/development of

Project Mgt. & Finance


CLR-3: understand basics of adaptively and learning,

Modern Tool Usage

Life Long Learning


complex problems
Problem Analysis

Communication
CLR-4: acquire knowledge on Basic models of cognitive processing and neuro models

Environment &
Sustainability
CLR-5: acquire knowledge on various computational algorithm

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: describe the design Models of single neurons, and small networks 3 1 - - - - - - - - - - - - 2
CO-2: illustrate Implementation of all simple as well as more complex numerical computations with few neurons 3 1 - - - - - - - - - - - - 2
CO-3: analyse connected networks in the mean-field limit 3 1 - - - - - - - - - - - 2 -
CO-4: formalize biological facts into mathematical models 3 1 - - - - - - - - - - - 2 -
CO-5: understand a simple mathematical model of memory formation in the brain 3 1 - - - - - - - - - - - - 3

Unit-1 - Introduction to Computational Neuroscience 9 Hour


History of Computational Neuroscience- Models in Computational Neuroscience - Intro- Neuron - axons, dendrites etc, the four components of Neural Signalling Neuro transmission: neuro transmitter, reception
channel, Electrophysiology -Nernst potential, resting potential, Goldman- Hodgkin-Katz voltage equation, outline of the Hodgkin- Huxley model. Modelling channel kinetics, activation, and inactivation gates Complete
formulation of Hodgkin- Huxley model.
Unit-2 - Components of Neural Signalling 9 Hour
Four components of Neural Signalling -Neurotransmission -Population dynamics -Modelling the average behaviour of neurons- Modelling the average behaviour of neurons - Huxley Model -Spiking neuron models
Single Spiking neuron models - Detailed Spiking neuron models – 2D Model Integrate and firing model -Leaky integrate-and-fire model - Integrate and firing model -Nonlinear integrate-and-fire model - Integrate and
firing model -
Unit-3 - Artificial Neural Network to Realistic 9 Hour
Introduction Modelling the ventral stream Modelling the dorsa and auditory stream Mechanical behaviour of ceramics-flexural strength -The Perceptron. Mapping function Multi-layer Perceptron Back-propagation –
Intuition, Derivation Back-propagation –Loss Function Back-propagation – Limitation Support Vector Machines - Classification Support Vector Machines - Regression Support Vector Machines – Kernel Function
Self-Organizing Maps - Introduction Self-organizing Maps - Variable Self-organizing Maps - Algorithm Self-organizing Maps – SOM Initialization Self-organizing Maps
Case studies: Regression Support Vector Machines, Korhonen Algorithm

117
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Memory Classification 9 Hour
Memory Classification Scheme – Declarative, Non-declarative Auto-associative network and hippo campus - Learning and retrieval phase Point-attractor neural networks - Network dynamics and training Signal-to-
noise analysis - Noisy weights and diluted attractor networks- Asymmetrical networks Non-monotonic networks Complementary memory systems Distributed model of working memory- Limited capacity of working
memory The spurious synchronization hypothesis The interacting-reverberating-memory hypothesis Motor Learning and Control Feedback controller Forward and inverse model controller The cerebellum and motor
control
Unit-5 - Different Learning Methods 9 Hour
Hebbian Learning-Hebbian- versus Perceptron Learning- Gradient Descent Learning-Stabilizing Hebbian Learning-Variations of Hebbian Learning Nonlinear Hebbian learning -Linker’s Model of the Visual System
-Lateral Geniculate Nucleus -Striate Cortex Linker’s model for orientation columns - Reinforcement Learning -Elements of Reinforcement Learning -Markov decision process-Dynamic - programming algorithms for
solving MDPs - Algorithms for large state spaces. Case studies: Gradient temporal difference learning, Reinforcement Learning,

1. Thomas Trappenberg, “Fundamentals of Computational Neuroscience” Oxford University 3. Richard S. Sutton and Andrew G. Barto, “Reinforcement Learning an Introduction”, 2nd
Learning Press, January2010 Edition, The MIT Press, 2018
Resources 2. Peter Dayan & LF Abbot, “Theoretical Neuroscience: Computational and Mathematical
Modelling of Neural Systems”, MIT Press,2005

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 40% - 40% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.P S Saravanan, Associate Consultant, CTS, USA 1. Dr.A Balaji , Senior Assistant Professor at VIT Bhopal University, 1. Dr. K Suresh, SRMIST
2. Prof.K Somasundram, Department of Computer Science and Engineering, Saveetha 2. Dr. R.Siva, SRMIST
School of Engineering, Saveetha Institute of Medical and Technical Sciences,

118
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE376T NATURE INSPIRED COMPUTING TECHNIQUES E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: analyze concepts of Natural systems and its applications 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: study new basic natural systems functions(operations)

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: introduce fundamentals of nature inspired techniques which influence computing

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: integrate Hardware and software in Natural applications

Environment &
Sustainability
CLR-5: understand natural design considerations

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: illustrate the basic concepts of Swarm Intelligence processes 3 3 - - - - - - - - - - - - 1
CO-2: examine the principle of Immune computing techniques 3 2 - - - - - - - - - - - - 1
CO-3: manage the scope changes of nature inspired techniques which influence computing 3 2 - - - - - - - - - - - - 2
CO-4: identify optimization Techniques to provide functionality and value 3 2 - - - - - - - - - - - - 2
CO-5: understand the needs and familiarize the DNA Computing 2 2 - - - - - - - - - - - - 3

Unit-1 - Introduction 9 Hour


Introduction, Overview of Philosophy, Nature to Nature Computing, A Brief Overview of Three Branches, Computing Inspired by nature, Simulation and Emulation of Nature i Computers, Computing with Natural
Materials, Nature Inspired Computing Approaches.
Unit-2 - Conceptualization 9 Hour
Natural Phenomena, Models and metaphors, Nature to computing and back again, Individuals, Entities and agents, Parallelism and Distributivity Interactivity, Adaptation- Feedback, Self-Organization, Complexity,
Emergence, Bottom-up Vs Top-Down Approach, Determination, Chaos and Fractals.
Unit-3 - Evolutionary Computing 9 Hour
Hill Climbing, Simulated Annealing, Simulated Annealing, Genetics Principles, Standard Evolutionary Algorithm, Genetic Algorithms, Reproduction, Crossover Mutation, Evolutionary Programming, Genetic
Programming
Unit-4 - Neurocomputing 9 Hour
The Nervous System, Levels of Organization in the Nervous System, Networks Layers and Maps, Basis of learning and Memory, Artificial Neural Networks, Network Architectures, Learning Approaches, ANNS and
Learning Algorithms- Hebbian Learning, Single Layer Perceptron, Multilayer Perceptron. Case Study: Bank loan approval using ANN
Unit-5 - Swarm Intelligence 9 Hour
Introduction, Ant Colony Optimization, Ant Foraging Behaviour, Ant Colony Optimization, SACO algorithm, Ant Colony Algorithm (ACA), scope of ACO algorithms, Swarm Robotics, Social Adaptation of
Knowledge, Particle Swarm Optimization - Case Study: Swarm Intelligence in Bio Inspired Computing Problem.

119
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Fundamentals of Natural Computing, Basic Concepts, Algorithms and Applications”, Chapman 4. Nature-Inspired Computing and Optimization Theory and Applications,Srikanta Patnaik
&Hall/CRC, Taylor and FrancisGroup, 2007. Xin-She Yang,Kazumi Nakamatsu,Springer, 2018
Learning
2. Floreano D. and Mattiussi C.,"Bio-Inspired Artificial Intelligence: Theories, Methods and 5. AlbertY.Zomaya,"Handbook of Nature-Inspired and Innovative Computing ", Springer,
Resources
Technologies", MIT Press, Cambridge, MA, 2008. 2006 4. Marco Dorrigo, Thomas Stutzle,ǁ Ant Colony Optimizationǁ, PHI,2005.
3. Nature-Inspired Computing Concepts, Methodologies, Tools, and Applications, IGI Global,2016

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 30% - 30% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. JothiBasu Kamaraj, [email protected] 1. Dr.D.Paulraj, Professor, RMKCET,[email protected] 1. Dr.B.Hariharan, SRMIST
2. Mr.Sankara Mukunthan [email protected] 2. Dr.S.Kaliraj, Assistant Professor, MAHE, [email protected]

120
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE377T INFORMATION RETRIEVAL E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline of theoretical basis behind the standard models of Information Retrieval 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: analyze relevance feedback and query expansion processes

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: classify text and usage of supervised and unsupervised algorithms

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: study Information Retrieval process and Web Retrieval Techniques

Environment &
Sustainability
CLR-5: understand content Based Image Retrieval and Deep learning models for Information Retrieval

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the standard retrieval models and comprehend the operations of information processing 2 3 2 - - - - - - - - - - - 1
CO-2: analyze the query expansion mechanism and evaluate the model by applying various metrics - 3 3 - - - - - - - - - - - 2
CO-3: gain the knowledge on text classification algorithms and apply for the process of feature selection - 3 3 - - - - - - - - - - - -
CO-4: acquire the concepts of Probabilistic Information Retrieval models and practice mechanisms for web crawling - 3 3 - - - - - - - - - - - 2
CO-5: gain insight into image retrieval techniques and analyze the deep learning models for information retrieval - 3 3 - - - - - - - - - - - 2

Unit-1 - Introduction to Information Retrieval 9 Hour


Information Retrieval Process, Indexing, Information retrieval model, Boolean and Vector-Space Retrieval models; Ranked retrieval; Text-similarity metrics; TF-IDF weighting; Dictionary and Postings - Tokenization,
stop words, Stemming, Inverted index, Skip pointers, Phrase queries.
Unit-2 - Query Evaluations and Metrics 9 Hour
Query Expansion - Relevance feedback, Rocchio algorithm, Query Expansion and its types, Query drift; XML Indexing - A vector space model for XML retrieval, Evaluation of XML retrieval, Text-centric vs. Data-
centric XML retrieval; Evaluation - Precision, Recall, F-measure, E-measure, Normalized recall, Evaluation problems
Unit-3 - Text Classification and Clustering 9 Hour
Text Classification and Clustering - Characterization of Text Classification – Unsupervised Algorithms: Clustering – Naïve Text Classification – Supervised Algorithms – Decision Tree – k-NN Classifier – SVM
Classifier – Feature Selection or Dimensionality Reduction - Case study using Clustering.
Unit-4 - Probabilistic and Web-Based Retrieval 9 Hour
Probabilistic Information Retrieval - Probabilistic relevance feedback, Probability ranking principle, Binary Independence Model, Bayesian network for text retrieval; Web Retrieval and Web Crawling - Web search
basics, crawling, indexes, Link analysis - Web Characteristic, Crawling, Web As a graph, Page Rank, Hubs and Authorities - Case study on Web Retrieval.
Unit-5 - Image Retrieval Methods 9 Hour
Content Based Image Retrieval - Introduction to content Based Image retrieval, Challenges in Image retrieval, Image representation, Indexing and retrieving images, Relevance feedback.

121
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. C. Manning, P. Raghavan, and H. Schütze, Introduction to Information Retrieval, Cambridge 5. ChengXiangZhai, Sean Massung, "Text Data Management and Analysis: A Practical
University Press, 2008. Introduction to Information Retrieval and Text Mining", ACM Books, 2016.
2. Stefan Buettcher, Charles L. A. Clarke and Gordon V. Cormack, Information Retrieval: 6. Soumen Chakrabarti, Mining the Web Discovering Knowledge from Hypertext Data, Morgan-
Learning Implementing and Evaluating Search Engines, the MIT Press, 2010. Kaufmann Publishers, 2002
Resources 3. Tanveer Siddiqui and U. S. Tiwary, Natural Language Processing And Information Retrieval, 7. David A. Grossman, Ophir Frieder, Information Retrieval: Algorithms and Heuristics, the
Oxford Higher Education, 2008 Information Retrieval Series, 2nd Edition, 2004.
4. Ricardo Baeza-Yates, Berthier Ribeiro-Neto, "Modern Information Retrieval: The Concepts 8. Hang Li, Learning to Rank for Information Retrieval and Natural Language Processing,
and Technology Behind Search", Addison Wesley, 2010. Morgan & Claypool publishers, Second Edition, 2014

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 30% - 20% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 20% - 30% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Padmapriya Madhivanan, Senior Data Scientist, DXC 1. Dr.P.Shanthi Bala, CS, Pondicherry University, Puducherry 1. Dr. M Vimaladevi, SRMIST
Technologies

122
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE396T DESIGN PRINCIPLES OF SMART SPACE MANAGEMENT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand Space fundamentals and IoT Architecture 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: learn different Protocols for IoT Design

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: familiarize the Concepts of smart space design

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: build IoT with Raspberry Pi and Arduino for smart space

Environment &
Sustainability
CLR-5: understand the role of psychology in space making and applying IoT in space design

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: distinguish IoT applications in different domains 3 2 2 - - - - - - - - - 1 - -
CO-2: apply various protocols for design of IoT systems 3 2 2 - - - - - - - - - 1 2 -
CO-3: illustrate the techniques for smart spaces 3 2 2 - - - - - - - - - - - -
CO-4: deploy an IoT application using Raspberry Pi/Arduino 3 2 2 - - - - - - - - - 1 2 3
CO-5: analyze applications of IoT in Real time scenario 3 2 2 - - - - - - - - - 1 2 3

Unit-1 - Introduction to Space Design and IoT 9 Hour


Introduction to spatial design, Characteristics of space design aspects, Spatial Requirements, User & function, Standards & Requirements in spatial Design, Introduction to Internet of Things - Characteristics of IoT,
IoT Network Architecture and Design, Drivers Behind New Network Architectures, Comparing IoT Architectures – The oneM2M IoT Standardized Architecture, The IoT World Forum (IoTWF) Standardized
Architecture, A Simplified IoT Architecture, The Core IOT Functional Stack, IoT Data Management and Compute Stack Hierarchy of Ede, Fog and Cloud, Smart Objects: Things in IOT, Sensors, Actuators, Micro-
Electro- Mechanical Systems (MEMS) and Smart objects, Sensor Networks, Wireless Sensor Networks (WSNs)
Unit-2 - IoT Protocols 9 Hour
Protocol Standardization for IoT, M2M and WSN Protocols, SCADA and RFID Protocols, Unified Data Standards, WPAN Technologies for IoT, Protocols – IEEE 802.15.4, Zigbee Architecture, Wireless HART, Near-
field communication (NFC), Z-Wave, Bluetooth Low Energy (BLE), BACnet, Modbus IP Based Protocols for IoT, Network layer – 6LowPAN, CoAP, Edge connectivity and protocols, Cloud Platforms for IOT
Unit-3 - Smart Space Design 9 Hour
introduction to smart spaces, Need and Significance of smart space, Example projects for smart space, Presentation, Factors considered for smart space design, Need User profile, Factors considered for smart
space design Activity Efficiency required, Application of smart concepts in space Lighting, Application of smart concepts in space Automation Signage, Exercise and Discussion (essential factors and applications)
Unit-4 - IoT Development Boards 9 Hour
IoT Development Boards: Arduino IDE and Board Types, Building IOT with Raspberry Pi, IoT Systems - Logical Design using Python, IoT Physical Devices & Endpoints, IoT Device -Building blocks - Raspberry Pi
–Board-,Linux on Raspberry Pi, Raspberry Pi Interfaces, Programming Raspberry Pi with Python, Other IoT Platforms – Arduino, Interfacing Relay Driver with Arduino Uno, Programming Logic to Control Electrical
Devices via Bluetooth using Arduino, Control Electrical Devices via Bluetooth Communication, Check Electrical Device status over Internet, Implementation of Home Automation using Arduino.
Unit-5 - Psychology and Future Trends 9 Hour
Role of user experience in spatial design, Introduction to Psychology in space making – smart spaces, Impact of Psychology in space making – IQ, Impact of Psychology in space making – EQ, Impact of Psychology
in space making – SQ, Applications in smart spatial Design, Examples for Current research and Future trends in smart spatial design, Case Study: Smart Home Automation, Case Study: Smart Lighting.
123
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. David Hanes, Gonzalo Salgueiro, Rob Barton ,”IoT Fundamentals: Networking 6. Tom Hargreaves, Charlie Wilson, “Smart Homes and their users”, Springer
Technologies, Protocols, and Use Cases for the Internet of Things”, ,Cisco Press, 2017 7. Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds), ―Architecting the Internet of
2. Arshdeep Bahga, Vijay Madisetti, ―Internet of Things – A hands-on approachǁ, Thingsǁ, Springer, 2011.
Universities Press, 2015 8. https://in.pcmag.com/simplisafe-home-security-system/129484/how-to-set-up-your-smart-
Learning 3. Hakima Chaouchi, ― “The Internet of Things Connecting Objects to the Web” ISBN : home-a-beginners-guide
Resources 978-1- 84821-140-7, Wiley Publications 9. https://www.homebuilding.co.uk/advice/how-to-design-a-smart-home
4. Olivier Hersent, David Boswarthick, and Omar Elloumi, ― “The Internet of Things: Key 10. https://www.archdaily.com/936027/psychology-of-space-how-interiors-impact-our-behavior
Applications and Protocols”, WileyPublications 11. https://sushantuniversity.edu.in/blog/do-you-know-how-psychology-of-space-is-impacting-
5. Juan Carlos Augusto, Chris D Nugent, “Designing Smart Homes”, Springer interior-designing/
12. https://www.ylighting.com/blog/smart-home-lighting-guide/

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 30% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ar.Apsaran Raja,Kaalo, NID, Chennai 1. Prof. Premkumar, NIT Trichy 1. Dr.R.Annie Uthra,SRMISTL
2. Dr.M.Ferni Ukrit, SRMIST
3. Mrs.Sri Vallaba, Architecture and Interior Design, SRMIST
4. Dr.A.Alice Nithya, SRMIST

124
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE397T PHILOSOPHY OF COGNITIVE SCIENCE E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the fundamentals of cognitive Science and Computing 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: identify the role of brain simulation in the area of cognitive system

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


comprehend the relationship between Machine learning algorithms and cognitive systems and the
CLR-3:

Modern Tool Usage


different types of Knowledge representation

Life Long Learning


complex problems
Problem Analysis

Communication
CLR-4: apply the techniques of advanced analytics to cognitive computing and cloud

Environment &
Sustainability
CLR-5: create a cognitive application and analyse their implementation in various sectors

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the basic concept and building blocks of cognitive Science - 1 - 2 - - - - - - - - 1 - 2
CO-2: apply the base concept of Brain simulation in cognitive computing - 2 - 2 - - - - - - - - 1 - 2
CO-3: develop the relationship between Machine learning and cognitive systems - 3 - 2 - - - - - - - - - - 3
CO-4: experiment with the various advanced analytics to cognitive computing - 2 - 3 - - - - - - - - - - 3
CO-5: build a cognitive application and their deployment in various domains - 2 - 3 - - - - - - - - - - 3

Unit-1 - Introduction to Cognitive Science 9 Hour


Introduction –Philosophy of cognitive science- Interdisciplinary Nature of Cognitive Science and Cognitive Computing Systems-Representations for information and knowledge - Principal technology enablers of
cognitive computing- Cognitive Computing Architectures and Approaches
Unit-2 - Analytics on Neuroscience 9 Hour
Brain scalability - Neocortical Brain Organisation- Concept of a basic circuit- Hardware support for brain simulation- Visual Analytics as an approach to cognitive computing- time evolving graphs- Description of
Cygraph
Unit-3 - Role of Machine Learning in Cognitive Science 9 Hour
Types of Learning - Machine Learning Algorithms- Supervised Learning -Unsupervised Learning -Predictive Analytics -Business Value of Predictive Analytics -Text Analytics -Business Value of Text Analytics-Image
and Speech Analysis Cognitive analytics applications- Random Forest Classifiers- STE-M Model - Cognitive random forest- Cognitive computing system.
Unit-4 - Advanced Analytics 9 Hour
Applying Advanced Analytics to Cognitive Computing -Advanced Analytics Is on a Path to Cognitive Computing -Key Capabilities in Advanced Analytics -The Relationship Between Statistics, Data Mining, and
Machine Learning –Using Machine Learning in the Analytics Process – Role of Cloud Computing in Cognitive science- Case study: Role of Cognitive science in human behaviour analysis, Monitoring the facial
expression of down syndrome patient
Unit-5 - Application and Case studies 9 Hour
The Process of Building a Cognitive Application -The Emerging Cognitive Platform -Defining the Objective -Defining the Domain -Understanding the Intended Users and Defining their Attributes -Defining Questions
and Exploring Insights - Typical Question-Answer pairs -Anticipatory Analytics -Acquiring the Relevant Data Sources -The Importance of Leveraging Structured Data Sources the Business Implications of Cognitive
Computing. Case study: Recording the data in healthcare concierge, detection of anomaly in cerebral palsy

125
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Vijay V Raghavan,Venkat N.Gudivada, Venu Govindaraju, C.R. Rao, Cognitive Computing: 3. Computational Intelligence for Big Data Analysis Frontier Advances and Applications,
Learning Theory and Applications: (Unit 1 ,2 ,3)VJudith Hurwitz, Marcia Kaufman, Adrian Bowles D.P. Acharjya Satchidananda Dehuri, Sugata Sanyal
Resources 2. , Cognitive Computing and Big Data Analytics, Wiley Publications, 2015Volume 35 (Handbook 4. Cognitive Computing for Human-Robot Interaction: Principles and Practices, Mamta
of Statistics), chapter 5, 2016(Unit 4,5) Mittal, Sudipta Roy, Rajiv Ratn Shah.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 40% - 40% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.K. Selvanayagam, Practise Lead CPQ, Salesforce, Preldesys India Pvt Lrd 1. Dr. Mariammal, Anna University 1. Dr.M. Maheswari, SRMIST

126
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE398T LOGIC AND KNOWLEDGE REPRESENTATION E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: gain knowledge on propositional logic and first order logic 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the concept of description logic and reasoning methods

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: know about uncertainty, probability notations and non-monotonic reasoning

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: gain knowledge on qualitative modeling representations

Environment &
Sustainability
CLR-5: understand and construct Bayesian Networks and apply inference techniques

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand and illustrate propositional and First order logic representations - 2 - 2 - - - - - - - - 1 - -
CO-2: understand inference in FOL and description logic representations - 1 - 3 - - - - - - - - 2 - -
CO-3: apply Bayes rule in uncertainty and understand non-monotonic reasoning methods - 2 - 2 - - - - - - - - - - 2
CO-4: illustrate qualitative modeling representation techniques - 2 - 2 - - - - - - - - - 2
CO-5: construct Bayesian network and apply its inference methods - 2 - 3 - - - - - - - - - - 3

Unit-1 - Introduction to Knowledge and Logic 9 Hour


Knowledge Representation terminologies: syntax –Semantics, Representation languages, Inference validity and satisfiability, Inference in Computers, Logics, Fuzzy logic Propositional Logic: syntax, semantics,
validity and inference, Rules of inference for propositional logic, An agent for the Wumpus world, First order Logic: syntax and semantics, Extensions and Notational variations, Logical agent for Wumpus world
Unit-2 - Procedural Control of Reasoning 9 Hour
Inference in FOL: inference rules involving quantifiers forward and backward chaining, Resolution, Description Logics, Introduction A basic DL and its Extensions, Relationships with other Formalisms, Tableau
Based Reasoning Techniques, The Automata Based Approach, Structural Approaches.
Unit-3 - Uncertainty 9 Hour
Uncertainty: Handling uncertain knowledge basic probability notation, Conditional probability, The axioms of probability, The joint probability distribution, Bayes’ rule and its use Applying Bayes' rule. Nonmonotonic
Reasoning Introduction, Default Logic, Auto epistemic Logic, Circumscription, Nonmonotonic Inference Relations, Semantic Specification of Inference Relations, Default Conditionals, Relating Default and Auto
epistemic Logics, Case study: Relating Default Logic and Circumscription
Unit-4 - Qualitative Modeling 9 Hour
Qualitative Modelling, introduction Qualitative Mathematics, Ontology, Component Ontologies, Process Ontologies, Field Ontology, Causality, Compositional Modelling, Qualitative Spatial Reasoning, Topological
Representations, Shape, Location, and Orientation Representations, Diagrammatic Reasoning, Qualitative Modelling Applications, Automating or Assisting Professional Reasoning, Education, Cognitive Modelling
Unit-5 - Bayesian Networks 9 Hour
Bayesian Networks: Introduction Syntax and Semantics of Bayesian Networks Exact Inference, Inference with Local (Parametric) Structure, Solving MAP and MPE by Search, Compiling Bayesian Networks,
Inference by Reduction to Logic, Approximate Inference: Inference by Stochastic Sampling, Inference as Optimization, Constructing Bayesian Networks: Knowledge Engineering, High-Level Specifications, Learning
Bayesian Networks, Case study: Knowledge representation and Question Answering

127
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. S. Russell and P. Norvig. Artificial Intelligence 2nd ed. Prentice Hall, 2002. 3. Boolos, G. S., Burgess, J. P., Jeffrey, R. C. Computability, and logic. – Cambridge university
Learning
2. Handbook of Knowledge Representation. Frank van Harmelen, Vladimir Lifschitz and Bruce press, 2002.
Resources
Porter (Eds). Foundations of Artificial Intelligence, 2008. 4. An Introduction to Description Logic. Franz Baader, Ian Horrocks, Carsten Lutz, Uli Sattler

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 30% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Kanitha Anand, CTS 1. Dr.A. Padmavathy, Amrita University Chennai Campus 1. Dr.A. Maheswari, SRMIST

128
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course ARTIFICIAL INTELLIGENCE IN GENOMICS AND DISEASE Course L T P C
21CSE411T E PROFESSIONAL ELECTIVE
Code Name PREDICTION Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: generate knowledge about biological macromolecules and bioinformatics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: provide knowledge on bioinformatics terms and file formats

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: create an interest about integrating artificial intelligence and genomics

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: initiate interest on the role of artificial intelligence cancer diagnosis

Environment &
Sustainability
CLR-5: understand the applications of artificial intelligence in proteomics and drug discovery

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: illustrate knowledge about biological macromolecules and bioinformatics - 2 2 - - - - - - - - - - - 2
CO-2: discuss about different file formats, NGS pipelines and tools 3 3 - - - - - - - - - - - - 2
CO-3: outline the concepts of artificial intelligence in genomics and pandemic predictions - 2 - - - - - - - - - - - - -
CO-4: demonstrate applicability of AI in cancer forecasting and diagnosis 2 - - - - - - - - - - - - - 3
CO-5: develop an approach in artificial intelligence for proteomics and drug discovery 2 2 - - - - - - - - - - - - -

Unit-1 – Introduction to Molecular Biology 9 Hour


Overview of Central Dogma of Molecular Biology - Post Transcriptional & Post Translational Modifications; Classification of Nucleic Acid Bases and Amino Acids; Genomics, Transcriptomics and Proteomics; Mutation
and its types; Evolution of Sequencing methods – first, next and third generation – differences; Sequence Data and Quality
Unit-2 – File Formats and NGS Pipelines 9 Hour
Evolution of Bioinformatics – Sequence alignment – Indels – Homology, Identity, Similarity, Orthology, Paralogy&Xenology; Similarity Search Tools and its types; NCBI – Genbank; Unitprot – Swissprot; KEGG; File
formats – Fasta, Fastq, CSFasta; Mutalyzer and HGVS Python Pacakge - Transvar
Unit-3 – AI Genomics and Pandemic Prediction 9 Hour
Numpy, Pandas, Supervised learning algorithms, Random Forest, KNN, SVM, ANN, Clustering in bioinformatics, Supervised learning methods in analyzing transcriptomics data, AI and ML methods to the
investigation of Pandemics, Case study :Forecasting of pandemic using LSTM and in infectious disease diagnostics
Unit-4 – AI in Cancer Forecasting and Diagnosis 9 Hour
AI, ML and DL in cancer – determining cancer susceptibility, enhanced cancer diagnosis and staging, treatment response, recurrence and survival and personalized cancer pharmacotherapy, Random Forest
classification for breast cancer, ML approach to diagnose cancer at early stage.
Unit-5 – AI in Proteomics and Drug Discovery 9 Hour
AI in proteomics, AI in proteomics data integration, Scope of AI in drug discovery, Molecular modeling and databases in AI for drug molecules, computational mechanics ML methods in molecular modeling, Drug
characterization using isopotential surfaces, Case study :Drug design for neuroreceptors using ANN techniques

129
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Krane, D. E., Raymer, M. L. “Fundamental Concepts of Bioinformatics”, Benjamin Cummings, 5. Christophe Lambert, Darrol Baker, George P. Patrinos. “Human Genome Informatics -
(2003). Translating Genes into Health”, Elsevier Science, (2018).
2. Federico Divina, Francisco A. Gómez Vela, Miguel García-Torres. “Computational Methods 6. Smith KP, Kirby JE. Image analysis and artificial intelligence in infectious disease
Learning for the Analysis of Genomic Data and Biological Processes”, MDPI (AG) (2021). diagnostics. Clin Microbiol Infect. 2020 Oct; 26(10):1318-1323. doi:
Resources 3. Attwood.T.K. Parry-Smith D.J., "Introduction to Bioinformatics", 1st Edition, 11th Reprint, 10.1016/j.cmi.2020.03.012.
Pearson Education. 2005. 7. Mann M, Kumar C, Zeng WF, Strauss MT. Artificial intelligence for proteomics and biomarker
4. Adam Bohr and Kaveh Memarzadeh. Artificial Intelligence in Healthcare. 1st Edition. discovery. Cell Syst. 2021 Aug 18; 12(8):759-770. doi: 10.1016/j.cels.2021.06.006.
Academic publishers. Elsevier Science. 2020

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 25% - 25% - 25% -
Level 4 Analyze 25% - 25% - 25% -
Level 5 Evaluate 10% - 10% - 10% -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.C.Ramakrishnan, Principal Scientist, Molecular Design Division 1. Dr Shandar Ahamad, Professor, Jawaharlal Nehru 1. Dr.Habeeb. S. K. M, SRMIST
Aroniter Co., Seoul, South Korea [email protected] University,[email protected]
2. Mr. Sudheendra Rao, Director, DataLore Labs, Bengaluru 2. Dr. Balachandran Manavalan, Research Professor, 2. Dr.ThirumurthyMadhavan, SRMIST
[email protected] Department of Physiology, Ajou University School of Medicine,
World Cup-ro, Yeongtong-gu, Suwon,
3. Dr.G.Maragatham, SRMIST

130
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE412T MACHINE LEARNING IN DRUG DISCOVERY E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: generate knowledge about macromolecules and their structural importance 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquire the basis of small molecule descriptor calculations and their algorithms

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: provide the knowledge about drug discovery process

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: manipulate data using Python

Environment &
Sustainability
CLR-5: understand various ML algorithms and their application in biological dataset

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: recall knowledge about macromolecules and their structural importance 2 2 - - - - - - - - - - - - 2
CO-2: apply knowledge on developing various models 2 2 - - - - - - - - - - - - 2
CO-3: discuss knowledge about drug discovery pipeline 2 2 3 - - - - - - - - - - - -
CO-4: learn how to use Scikit-learn to apply powerful machine learning algorithms 3 - 2 - - - - - - - - - - - 3
CO-5: apply knowledge on ML models and learn best practices for drug discovery dataset 3 - 2 - - - - - - - - - - - -

Unit-1 - Macromolecules and Their Structural Importance 9 Hour


Central Dogma of molecular Biology, Structure of DNA, RNA, Amino acids, Classes of Proteins, Protein architecture, Structure stabilizing interactions, Protein folding problem, Solving protein structures,
Mechanisms of enzyme actions
Unit-2 - Computer Representation for Developing 2D and 3D Models 9 Hour
Computer representation of 2D chemical structures, Graph theory to represent Chemical Structures, Connection table, Computer representation of 3D chemical structures, biological databases
Unit-3 – Drug Discovery Pipeline 9 Hour
Sequence analysis, Methods of sequence analysis, Introduction to drug discovery process and computational approaches, “Drug-Likeness” and Compound Filters, ligand and Structure based drug design, Virtual
screening, Protein–Ligand Docking
Unit-4 - Scikit-Learn for Machine Learning Analysis 9 Hour
Basics of Python for ML data analysis, String function for nucleic acid sequence, Numpy, and Pandas, basic graph theory
Unit-5 – Knowledge of ML Models for Drug Discovery 9 Hour
Machine learning pathway overview, Types of Machine learning algorithms, Cross validation: Test and Training split, Introduction to Biological Dataset construction, case studies of drug molecules benchmarking
datasets and ML model generation

1. Attwood.T.K. Parry-Smith D.J., "Introduction to Bioinformatics", 1st Edition, 11th Reprint, 3. Online Sources: https://wiki.python.org/moin/BeginnersGuide/Programmers.
Learning Pearson Education. 2005. 4. Mount D., “Bioinformatics: Sequence and Genome Analysis”, 2 nd Edition, Cold Spring
Resources 2. Rastogi.S.C. Namita., M., Parag, R., "Bioinformatics- Concepts, Skills, and Applications", CBS Harbor Laboratory Press, New York. 2004.
Publishing. 2009. 5. Murthy.C.S.V. "Bioinformatics", 1st Edition, Himalaya Publishing House.2003.
131
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 10% -
Level 2 Understand 25% - 20% - 20% -
Level 3 Apply 30% - 35% - 35% -
Level 4 Analyze 30% - 35% - 35% -
Level 5 Evaluate - - - - -
Level 6 Create - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.C.Ramakrishnan, Principal Scientist, Molecular Design Division 1. Dr Shandar Ahamad, Professor, Jawaharlal Nehru University, 1. Dr.ThirumurthyMadhavan, SRMIST
Aroniter Co., Seoul, South Korea [email protected] [email protected]
2. Mr. Sudheendra Rao, Director, DataLore Labs, Bengaluru 2. Dr. Balachandran Manavalan, Research Professor, Department 2. Dr. Habeeb. S. K. M, SRMIST
of Physiology, Ajou University School of Medicine, Yeongtong-
gu, Suwon, South Korea
3. Dr.G.Maragatham G, SRMIST

132
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE414T IOT CONCEPTS AND APPLICATIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce the concept of Basics of IoT and different devices and architecture of IoT Technology 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: outline the State of the Art – Data Management and IoT Component Explanation

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: acquire the knowledge of Data Link Layer and Network Layer protocols

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn the IoT Reference Architecture, Transport, Session, and Service Layer Protocols

Environment &
Sustainability
CLR-5: exploit the various IoT Security attacks and Applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: interpret the vision of IoT architecture from a global context 1 - - - - - - - - - - - 1 - -
CO-2: articulate the state-of-the-art Data management and IoT component 1 2 - - - - - - - - - - - - -
CO-3: compare and contrast the use of data link and Network layer protocols in different applications 1 2 - - - - - - - - - - 1 - -
CO-4: implement using the available IoT Transport, Session, and Service Layer Protocols to different applications 1 1 1 - - - - - - - - - - - 2
CO-5: apply the IOT Security Techniques to avoid several attacks in relevant areas of IoT Product development 2 3 3 - - - - - - - - 1 - - 3

Unit-1 - IoT Fundamentals and Architecture Overviews 9 Hour


IoT-An Architectural Overview– Building an architecture, Main design principles and needed capabilities, An IoT architecture outline, standards considerations. M2M and IoT Technology Fundamentals- Devices and
gateways, State of the art-ETSI M2M, IoT Reference model-IoT Domain model, Communication Model.
Unit-2 - Data Management Introduction and IoT Components 9 Hour
Managing M2M data: Data generation, Data acquisition, Data validation, Data storage, Data processing, Data remanence, Data analysis, Business Process in IOT, M2M and IoT Analytics, Basics of Sensors and
Actuators,, Introduction to Arduino and its applications ,Sensor Interfacing Using Tinker CAD, Interfacing Sensor with Raspberry Pi 4.
Unit-3 - IoT Data Link Layer & Network Layer Protocols 9 Hour
PHY/MAC Layer (3GPP MTC, IEEE 802.11, IEEE 802.15), Wireless HART, Z-Wave, Bluetooth Low Energy, Zigbee Smart Energy, DASH7 - Network Layer-IPv4, IPv6, 6LoWPAN, 6TiSCH, DHCP (Dynamic Host
Configuration Protocol), ICMP(Internet Control Message Protocol), RPL(Routing Protocol for Low-Power and Lossy Networks), CORPL(Cognitive RPL), CARP(Common Address Redundancy Protocol).
Unit-4 - Transport, Session, and Service Layer Protocols 9 Hour
Transport Layer (TCP, MPTCP (Multipath TCP), UDP, DCCP(Datagram Congestion Control Protocol), SCTP(Stream Control Transmission Protocol)) -(TLS, DTLS) – Session Layer-HTTP, CoAP(Constrained
Application Protocol), XMPP(Extensible Messaging Presence Protocol), AMQP(Advanced Message Queuing Protocol), MQTT(Message Queuing Telemetry Transport.), Service Layer -oneM2M(Machine to
Machine), ETSI M2M, OMA(Open Mobile Alliance), BBF. Real-Time Case Studies: Smart Travel Applications, Smart Home using Drones
Unit-5 - IoT Security Attacks and Applications 9 Hour
Understanding Security and Interoperability, Modes of attack: Web Crawl, Search Features and Wild Cards, Breaking Cipher Tools for achieving Security: VPN, X.509, Authentication, Tools for achieving Security:
User names and Passwords, Message Brokers, Real-Time Case Studies: Disaster Prevention, Smart Agriculture.

133
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. “IoT Fundamentals: Definitions, Architectures, Challenges, and Promises”,by Farshad 4. Jan Holler, VlasiosTsiatsis, Catherine Mulligan, Stefan Avesand, StamatisKarnouskos, David
Firouzi, Bahar Farahani, Markus Weinberger,and Fereidoon Shams Aliee. Boyle, “From Machine-to-Machine to the Internet of Things: Introduction to a New Age of
DOI: 10.1007/978-3-030-30367-9_1 , January 2020. Intelligence”, 1st Edition, Academic Press, 2014
2. Uckelmann, D., Harrison, M., & Michahelles, F. (Eds.). Architecting the Internet of 5. Peter Waher, “Learning Internet of Things”, PACKT publishing, BIRMINGHAM – MUMBAI
Learning Things.doi:10.1007/978-3-642-19157-2, 2011. 6. Daniel Minoli: Building the Internet of Things with IPV6 and MIPV6 evolving World of M2M
Resources 3. IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Communication”, ISBN 978-1-118-47347-4 Willy Publications. WebSite Reference:
Internet of Things by Rob Barton, Gonzalo Salgueiro, David Hanes, Publisher: Cisco 1) https://onlinecourses.nptel.ac.in › noc22_cs53 › preview
Press, Release Date: June 2017, ISBN: 9780134307091 2) https://www.coursera.org/specializations/uiuc-iot
(https://www.oreilly.com/library/view/iot-fundamentals-networking/9780134307091/). 3)https://www.mygreatlearning.com/academy/learn-for-free/courses/what-is-iot
4) https://www.edx.org/learn/iot-internet-of-things

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 40% - 25% - 25% -
Level 3 Apply 15% - 30% - 30% -
Level 4 Analyze 15% - 25% - 25% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Vinay Solanki, Head IoT, Lenovo (APAC & MEA) 1. Dr.Zayaraj, Professor / CSE, PEC, Pondicherry 1. Dr. S.Amudha, SRMIST
2. Dr. Paventhan Arumugum, Director (R&D), ERNET India 2. Dr.Vijalakshmi Associate Professor / CSE, PEC, Pondicherry 2. Dr.Kayalvizhi Jayavel, SRMIST
3. Mr.Shiv Kumar Ganesh, Full Stack Developer, Altimetrik 3. Dr.P.Yogesh, Professor/IT, Anna University, Chennai. 3. Dr. S.Babu, SRMIST

134
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE415T FUZZY LOGIC AND ITS APPLICATIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline the ideas of fuzzy sets, fuzzification and defuzzification 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: explain fuzzy logic and fuzzy systems with examples

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: introduce decision making with fuzzy information

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: gain knowledge on fuzzy classification and pattern recognition

Environment &
Sustainability
CLR-5: design and implement fuzzy control systems and industrial applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain knowledge on Fuzzy sets to recognize the appropriateness of computational task 3 2 2 - - - - - - - - - 1 - -
CO-2: learn the foundations of fuzzy logic and methods for fuzzy systems 3 2 3 - - - - - - - - - 1 - -
CO-3: understand rule-based inference and decision making with fuzzy information 3 2 3 - - - - - - - - - - 2 -
CO-4: acquire and apply fuzzy classification and recognition methods 3 2 3 - - - - - - - - - - 2 -
CO-5: apply and Design fuzzy control systems with example applications 3 2 3 - - - - - - - - - - 2 3

Unit-1 - Introduction 9 Hour


The Case for Imprecision, The Utility of Fuzzy Systems, Limitations of Fuzzy Systems, Uncertainty and Information, Fuzzy Sets and Membership, Chance versus Fuzziness - Fuzzy Sets: Fuzzy Set Operations,
Properties of Fuzzy Sets, Noninteractive Fuzzy Sets, Alternative Fuzzy Set Operations - Fuzzy Relations: Crisp Relations, Fuzzy Relations, Fuzzy Tolerance and Equivalence Relations, Value Assignments, Problems
on fuzzy relation - Membership function – various forms –fuzzification – defuzzification to crisp sets.
Unit-2 - Logic and Fuzzy Systems 9 Hour
classical logic, fuzzy logic, fuzzy systems – Development of Membership functions: membership value assignments, intuition, Inference, rank ordering – Automated Methods for Fuzzy Systems: Definitions, Batch
Least Squares Algorithm, Recursive Least Squares Algorithm, Gradient Method, Learning From Example, Modified Learning From Example, Problems on logic and fuzzy systems
Unit-3 - Rule-Base Reduction Methods 9 Hour
: Fuzzy Systems Theory and Rule Reduction, Singular Value Decomposition, Combs Method, SVD and Combs Method Examples, problems on SVD and Combs method for rapid inference - Decision Making with
Fuzzy Information: Fuzzy Synthetic Evaluation, Fuzzy Ordering, Nontransitive Ranking, Preference and Consensus, Multiobjective Decision Making, Decision Making under Fuzzy States and Fuzzy Actions, problems
on decision making with fuzzy information.
Unit-4 - Fuzzy Classification and Pattern Recognition 9 Hour
Classification by Equivalence Relations, Cluster Analysis, Cluster Validity, c-Means Clustering, Fuzzy c-Means, Classification Metric, Similarity Relations from Clustering - Pattern Recognition: Feature Analysis,
Partitions of the Feature Space, Single-Sample Identification, Multifeature Pattern Recognition, problems on fuzzy classification and pattern recognition, Case Study: Hand written character recognition using fuzzy
logic.
Unit-5 - Fuzzy Control Systems 9 Hour
Control System Design Problem, Control (Decision) Surface, Assumptions in a Fuzzy Control System Design, Simple Fuzzy Logic Controllers, Examples of Fuzzy Control System Design, Aircraft Landing Control
Problem - Fuzzy Optimization - Fuzzy Linear Regression – problems on fuzzy optimization and regression, Case study: Robot Navigation using fuzzy logic.
135
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Ross, T. J., “Fuzzy logic with engineering applications,” John Wiley & Sons, Second Edition, 2017 4. Klir.G, Yuan B.B. Fuzzy sets and Fuzzy Logic Prentice Hall of India private limited, 1997
Learning 2. H.-J. Zimmermann, “Fuzzy Set Theoryand Its Applications”, 4th edition, Springe 5. https://ieeexplore.ieee.org/document/519069/
Resources Science+Business Media, LLC, 2001 6. https://www.academia.edu/2073261/A_case_study_of_fuzzy_logic_based_robot_navigat
3. J.-S. R. Jang, C.-T. Sun, and E. Mizutani, “Neuro-Fuzzy and Soft Computing” Prentice Hall. 1997. ion

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 30% - 20% - 20% -
Level 3 Apply 50% - 50% - 50% -
Level 4 Analyze - - 10% - 10% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.A.Vasanthi, Senior Consultant, Slalom · Sydney, New 1. Dr.A.Punitha, Associate Professor, Annamalai University 1. Mr.S.Joseph James, SRMIST
South Wales, Australia

136
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE416T ROBOTICS: COMPUTATIONAL MOTION PLANNING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the concepts of motion planning 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: able to study the potential functions and navigations

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: acquire knowledge of different Algorithms

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: discuss the localization and mapping methods

Environment &
Sustainability
CLR-5: gain knowledge about Trajectory and motion planning

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: discuss the methods of motion planning 2 3 - - - - - - - - - - 1 - -
CO-2: apply knowledge of Potential functions and Navigations 2 3 1 - - - - - - - - - 1 - 2
CO-3: implement the Sampling Algorithms 2 3 2 - - - - - - - - - - 2 -
CO-4: gain knowledge of mapping and path planning 2 3 2 - - - - - - - - - - - 2
CO-5: design and deploy trajectory and motion planning 3 3 2 - - - - - - - - - - - 3

Unit-1 - Motion Planning 9 Hour


Overview of Motion Planning –introduction to basic concepts and methods for motion planning – Simultaneous Localization and Mapping (SLAM) - GPS based obstacle avoidance – path finding - A* Algorithm - Bug
Algorithms -Bug1 and Bug 2 - Tangent Bug - Implementation: The Tangent Line - Distance On Gradient - Continuation Method.
Unit-2 - Potential Function 9 Hour
Addictive Attractive/Repulsive Potential - Gradient Descent - Computing Distance from Implementation In The Plane - Local Minima Problem - Wave-Front Planner - Navigation Potential Function: Sphere world,
from sphere to stars and beyond - Potential Functions for Rigid-Body Robots - Robot path planning using generalized Voroni diagrams.
Unit-3 - Probabilistic Road Map Path Planning 9 Hour
Sampling Based Algorithms- Basic PRM - Implementation of basic PRM - PRM sampling Strategies - PRM connection Strategies - Single-Query Sampling Based Planners: Expensive Spaces Trees - Rapidly
Exploring Random Trees - Connection Strategies and SBL Planner - Integration of Planners Sampling Based Roadmap- Analysis of PRM - Control based Planning - Multiple Robots - Manipulation Planning -
Assembly Planning.
Unit-4 - Filtering and Mapping 9 Hour
Linear Kalman Filtering - Kalman Filter: Example - Bayesian Methods: Localization - Basic Idea Probabilistic Localization - Probabilistic Localization as Recursive Bayesian Filtering - Derivation of Probabilistic
Localization - Representation Of Posterior - Sensor Model - Mapping: Mapping with known locations - Bayesian Simultaneous Localization and Mapping. Case study: Vision-based multi-robot simultaneous localization
and mapping.
Unit-5 - Trajectory Planning 9 Hour
Preliminaries - Decoupled Trajectory Planning - Direct Trajectory Planning: Optimal Control - Nonlinear Optimization - Grid-Based Search - Nonholonomic and Underactuated Systems: preliminaries - Control
Systems – Controllability - Motion Planning: Optimal Control - Steering Chained -Form Systems Using Sinusoids - Nonlinear Optimization. Case study: Motion planning.

137
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. HowieM.Choset, Seth Hutchinson, Kevin M.Lynch, George Kantor, Wolf ram Burgard, 2. Jean-ClaudeLatombe,"RobotMotionPlanning”, SpringerScience&BusinessMedia,2012
Learning
LydiaE. Kavraki, Sebastian Thrun, "Principles of Robot Motion: Theory, Algorithms, and 3. Rafel Valencia, Juan Andrade-Cetto, “Mapping, Planning and Exploration with Pose SLAM”,
Resources
Implementation",2016 Springer, 2018

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 10% - 10% -
Level 2 Understand 15% - 10% - 10% -
Level 3 Apply 35% - 45% - 45% -
Level 4 Analyze 30% - 35% - 35% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Rijo Jackson Tom Lead Data Scientist Augusta hitech 1. Dr. Thiyagarajan R Assistant Professor, Department of Mecahnical 1. Dr.J.J.Jayakanth, SRMIST
soft solution Engineering, Indian Institute of Technology Tirupati

138
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE417T REINFORCEMENT LEARNING TECHNIQUES E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce the fundamentals of Reinforcement Learning 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate model-based prediction and control using dynamic programming

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: illustrate model-free prediction and control

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: introduce planning and learning with tabular methods

Environment &
Sustainability
CLR-5: explain approximation of a value function

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand basic concepts of reinforcement learning 3 2 - 2 - - - - - - - - - - 2
CO-2: perform model-based prediction and control using dynamic programming 3 3 - 3 - - - - - - - - - - 2
CO-3: apply model-free prediction and control 3 3 - 3 - - - - - - - - - - 3
CO-4: comprehend the use of tabular methods 3 3 - 3 - - - - - - - - - - 3
CO-5: understand how a value function can be approximated 3 3 - 3 - - - - - - - - - - 3

Unit-1 - Introduction 9 Hour


Introduction to Reinforcement learning, examples - Elements of reinforcement learning - Limitations and Scope- An extended example - multi-armed bandits - k-armed bandit problem - action-value methods - the
10-armed testbed - incremental implementation - tracking a nonstationary problem - optimistic initial values - upper-confidence-bound action selection - associative search (contextual bandits)
T1: Implementing the 10-armed testbed
T2: Comparing performance for different values
T3: Upper-confidence bound action selection performance comparison with –greedy
Unit-2 - Markov Decision Process and Model-Based Prediction and Control 9 Hour
Finite Markov Decision Process - The Agent–Environment Interface - Goals and Rewards - Returns and Episodes - Unified Notation for Episodic and Continuing Tasks - Policies and Value Functions - Optimal
Policies and Optimal Value Functions - Optimality and Approximation - Dynamic Programming - Policy Evaluation (Prediction) - Policy Improvement - Policy Iteration - Value Iteration - Generalized Policy Iteration -
Efficiency of Dynamic Programming - Asynchronous Dynamic Programming
T4: MDP for Recycling Robot
T5: Policies and value functions for Gridworld example
T6: Policy evaluation for Gridworld example

139
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-3 - Model-Free Prediction and Control 9 Hour
Model-free learning - Model-free prediction - Monte Carlo methods - Monte Carlo Prediction - Monte Carlo Estimation of Action Values - Temporal-Difference Learning - TD Prediction - Advantages of TD Prediction
Methods - Optimality of TD(0) - n-step Bootstrapping - n-step TD Prediction - n-step Sarsa - Model-free control - Monte Carlo Control - Monte Carlo Control without Exploring Starts - Off policy learning - Importance
sampling - Off-policy Monte Carlo Control - Sarsa: On-policy TD Control - Q-learning: Off-policy TD control
T7: Monte Carlo Policy Evaluation for Blackjack
T8: TD Prediction for Driving Home example
T9: Sarsa vs Q-learning using Cliff Walking example
Unit-4 - Planning and Learning with Tabular Methods 9 Hour
Models and planning - Dyna: Integrated Planning, Acting and Learning - When the model is wrong - Prioritized Sweeping - Real-time Dynamic Programming - Monte Carlo Tree Search
T10: Simple maze using Dyna-Q
T11: Prioritized sweeping on Maze example
T12: Real-time Dynamic Programming for Racetrack example
Unit-5 - Value Function Approximation 9 Hour
On-policy Prediction with Approximation - Value Function Approximation - The Prediction Objective (VE) - Stochastic-gradient and Semi-gradient Methods - Linear Methods - Least-Squares TD
T13: State aggregation on the 1000-state Random Walk
T14: Bootstrapping on the 1000-state Random Walk
T15: Least squares TD example

1. Richard S. Sutton and Andrew G. Barto, Reinforcement Learning: An 3. Artificial Intelligence: A Modern Approach, Stuart J. Russell and Peter Norvig, 3rd edition, Pearson, 2015.
Learning introduction, 2nd edition, The MIT Press, 2015. 4. I. Goodfellow, Y. Bengio, A. Courville, Deep Learning, MIT Press Ltd., 2016.
Resources 2. Martijn van Otterlo, Marco Wiering, Reinforcement Learning: State-of-the-Art, 5. https://deepmind.com/learning-resources/-introduction-reinforcement-learning-david-silver
Springer-Verlag Berlin Heidelberg, 2012. 6. Reinforcement Learning with MATLAB, MathWorks Inc., 2020.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 40% - 40% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Ghulam Ahmed Ansari, Applied Research Engineer, LinkedIn 1. Dr. Manikantan Srinivasan, , Adjunct Faculty, CSE, IIT Madras 1. Dr. Saad Y. Sait, SRMIST

140
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE418T CYBER PHYSICAL SYSTEMS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline the basic concepts, requirements, principles, and techniques in emerging cyber physical systems 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the components that define the physical and cyber aspects of real-world technologies

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


CLR-3: analyze the processing units applicable for cyber physical system

Modern Tool Usage

Life Long Learning


complex problems
understand embedded systems vs Internet of Things implementing a cyber-physical system from a

Problem Analysis
CLR-4:

Communication
computational perspective

Environment &
Sustainability
CLR-5: acquire knowledge on Security and Privacy in Cyber Physical System

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the basic concepts and purpose of the different components of Cyber Physical Systems 1 - - - - - - - - - - - 1 - -
CO-2: analyze the new system and ability to interact with Cyber Physical System 1 2 2 - - - - - - - - - 2 - -
CO-3: illustrate the abstraction of various system architectures and understand the semantics of a CPS model 2 2 - - - - - - - - - - 1 - 2
CO-4: implement the ability to interact with cyber-physical systems protocols with Internet of Things 3 3 2 - - - - - - - - - 2 - 3
CO-5: apply the common methods used to secure cyber-physical systems 3 3 - - - - - - - - - - - - 3

Unit-1 - Framework for Cyber-Physical Systems (CPS) 9 Hour


Introduction to CPS- IoT Vs CPS- Concept map- CPS analysis by example- Application Domains-Significance of CPS- Hybrid System Vs. CPS- Multi dynamical system- Component of CPS- Physical- Cyber and
Computational Components.
Unit-2 - Physical Components 9 Hour
Introduction to sensors and actuators – Deployment- assignment and coordination – Network criteria designs- Importance of sensors- causality-sensor reliability-memory requirement- computational complexity-
redundant sensors-Operational criteria- Testbed.
Unit-3 - Cyber Components 9 Hour
Networking technologies for CPS- sensing networks and data connectivity- M2M communication- characteristics of IP and Non-IP solutions, 6LoWPAN, RPL- CoAP and HTTP- CoAP- Mobile cloud computing-
Definition and types.
Unit-4 - Computational Components 9 Hour
Embedded system design flow for CPS- processing units-Overview-ASIC-Processor-DSP, Multimedia processor- VIEW-microcontroller and MPSoC- Reconfigurable logics.
Unit-5 - Secure Deployment of CPS & Applications of CPS 9 Hour
Secure Task mapping and Partitioning - State estimation for attack detection - Automotive Vehicle ABS hacking - Power Distribution Case study: Attacks on Smart Grids – Virtual Instrumentation; Case study:
Applications of CPS.

141
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. A.Platzer,Logical Foundations of Induction.2018 6. Wolf, Marilyn. High-Performance Embedded Computing: Applications in Cyber-Physical Systems
2. Principles of Cyber Physical Systems, Rajeev Alur, MIT Press, 2015 and Mobile Computing. Elsevier, 2014.
3. E. A. Lee, Sanjit Seshia , "Introduction to Embedded Systems – A Cyber–Physical 7. Guido Dartmann, Houbing song, Anke schmeink, “Big data analytics for Cyber Physical System”,
Learning Systems Approach", Second Edition, MIT Press, 2017, ISBN: 978-0-262-53381-2 Elsevier, 2019
Resources 4. P.Ashok, G. Krishnamoorthy, and D. Tesar, “Guidelines for managing sensors in cuber 8. Chong Li, Meikang Qiu, “Reinforcement Learning for Cyber Physical Systems with Cyber Securities
physical systems with multiple sensors,” J. Sensors, vol.2011, 2011. Case Studies”, CRC press, 2019
5. P.Marwedel, Embedded System Design: Embedded system foundations of Cyber- 9. Christopher Greer, Martin Burns, David Wollman, Edward Griffor “Cyber-Physical Systems and
Physical Systems, vol.16.2010. Internet of Things”, NIST Special Publication, https://doi.org/10.6028/NIST.SP.1900-202

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 50% - 20% - 20% -
Level 2 Understand 50% - 30% - 30% -
Level 3 Apply - - 20% - 20% -
Level 4 Analyze - - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Ponnambalam Mudivai Arun, Director of Products Citrix 1. Dr. Munesh Pal Singh,IIITDM,Kancheepuram 1. Dr. Krishnaveni, SRMIST
System, Bangalore
2. Dr. N.Balaji, SSN College of Engineering

142
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE421T BUSINESS INTELLIGENCE AND ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1 : familiarize with business intelligence, analytics and decision support 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2 : understand the technologies for decision making

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3 : familiarize with predictive modeling techniques

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4 : familiarize with sentiment analysis techniques

Environment &
Sustainability
CLR-5 : understand about decision making systems

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain knowledge on business intelligence, analytics and decision support - - - - - - - - - - - - 1 - -
CO-2: understand the technologies for decision making - - - - - - - - - - - - - 2 -
CO-3: apply predictive modeling techniques - - - - - - - 3 - 3 - - 2 - -
CO-4: apply sentiment analysis techniques - - - - - - - 3 - 3 - - - - 2
CO-5: gain knowledge on decision making systems - - - - - - - 3 - 3 - - - 1 1

Unit-1 - Introduction: Business Intelligence, Analytics and Decision Support 9 Hour


Information Systems Support for Decision Making - An Early Framework for Computerized Decision Support - The Concept of Decision Support Systems - A Framework for Business Intelligence - Business Analytics
Overview - Brief Introduction to Big Data Analytics - Clickstream Analysis – Metrics - Clickstream Analysis - Practical Solutions - Competitive Intelligence Analysis
T1: Introduction to Power BI and SSMS
T2: Installing Power BI and SSMS
T3: Prepare data in Power BI Desktop
Unit-2 - Decision Making 9 Hour
Decision Making - Introduction and Definitions - Phases of the Decision - Making Process - The Intelligence Phase - Design Phase - Choice Phase - Implementation Phase - Decision Support Systems Capabilities
- Decision Support Systems Classification - Decision Support Systems Components
T4: Load data in Power BI Desktop
T5: Model data in Power BI Desktop part-1
T6: Model data in Power BI Desktop part-2
Unit-3 - Predictive Modeling and Sentiment Analysis 9 Hour
Basic Concepts of Neural Networks - Developing Neural Network - -Based Systems - Illuminating the Black Box of ANN with Sensitivity - Support Vector Machines - A Process Based Approach to the Use of SVM
- Nearest Neighbor Method for Prediction -Sentiment Analysis Overview - Sentiment Analysis Applications - Sentiment Analysis Process - Sentiment Analysis - Speech Analytics
T7: Implement data model using SQL in Power BI
T8: Create DAX calculations in Power BI Desktop part-1
T9: Create DAX calculations in Power BI Desktop part-2
143
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Multi-Criteria Decision Making Systems 9 Hour
Decision Support Systems modeling - Structure of mathematical models for decision support - Decision making under certainty - Uncertainty and Risk - Decision modeling with spreadsheets - Mathematical
programming optimization - Decision analysis introduction - Decision tables - Decision Trees - Multi-criteria decision making - Pairwise comparisons
T10: Design a report in Power BI Desktop part-1
T11: Design a report in Power BI Desktop part-2
T12: Create a Power BI dashboard
Unit-5 - Automated Decision Systems 9 Hour
Automated Decision Systems - The Artificial Intelligence field - Basic concepts of Expert Systems - Applications of Expert Systems - Structure of Expert Systems - Knowledge Engineering - Development of Expert
Systems - Location based Analytics - Cloud Computing - Business Intelligence
T13: Create a Power BI paginated report
T14: Perform data analysis in Power BI Desktop
T15: Enforce Row-level security

1. Ramesh Sharda, Dursun Delen, EfraimTurban, J.E.Aronson,Ting-Peng Liang, David 2. Brett Powell, “Mastering Microsoft Power Bi: Expert techniques for effective data analytics and
Learning King, “Business Intelligence and Analytics: System for Decision Support”, 10 th Edition, business intelligence”, 2018
Resources Pearson Global Edition, 2013. 3. Alberto Ferrari Marco Russo, “Definitive Guide to DAX, The: Business intelligence for Microsoft
Power BI, SQL Server Analysis Services, and Excel”, Second Edition, By Pearson, 2020

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.V.Selvakumar,Hexaware Technologies, [email protected] 1. Dr. T. Veerakumar, Professor, NIT Goa 1. Dr. T. Karthick, SRMIST

144
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

UNDERGRADUATE/ INTEGRATED POST


GRADUATE DEGREE PROGRAMMES
(With exit option of Diploma)

(Choice Based Flexible Credit System)

Regulations 2021

Volume – 11C
(Syllabi for Computer Science and Engineering w/s in
Software Engineering Programme Courses)

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

145
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Core Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

146
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC309J SOFTWARE ARCHITECTURE AND DESIGN C PROFESSIONAL CORE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: classify the essential elements of software architecture 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the issues related to architecting a large-scale software system

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand different software architectures views and styles

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: able to use the four-views approach for developing and documenting a software architectures

Environment &
Sustainability
CLR-5: understand the implications of different design patterns and critique an architecture of a software system

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: describe different approaches to design software application - - - 3 2 - - - - - - - - - 3
CO-2: analyze specifications and identify appropriate design strategies 2 3 - - - - - - - - - - - 2 -
CO-3: develop an appropriate design for a given set of requirements - - - - - - - - - - - - - 2 -
CO-4: identify applicable design patterns for the solution - 3 - - 3 - - - - - - - - - 3
CO-5: abstract, document and evaluate reusable design patterns specifications 1 - - - - - - - - - - - - - 3

Unit-1 - Introduction to Software Architecture 12 Hour


Software Architecture –Software Design, Importance and Need of Software Architecture, 4 +1 View Model, Activities in Software Architecture, Fundamental design issues, Understanding quality attributes, Six
parts of Quality Scenario, Design for quality attributes - Availability, Design for quality attributes - Modifiability, Design for quality attributes – Security, Design for quality attributes - Usability, Testability (General
Scenario, Tactics)
Unit-2 - Software Architecture Patterns 12 Hour
Software Architectural Patterns & Styles, Types of Architectural Styles, Layered pattern, Merits and Demerits of Layered Pattern, Pipe-Filter pattern, Merits and Demerits of Pipe and Filter, Shared Data Pattern,
Merits and Demerits of Shared Data Pattern, Client Server pattern, Merits and Demerits of Client Server, Blackboard Architectural Pattern, Merits and Demerits, Flight Simulation: A Case Study in an Architecture
for Integrability, Relationship to the Architecture Business Cycle, Requirements and Qualities related to flight simulation, Architectural Solution for flight simulation
Unit-3 - Software Architecture Analysis 12 Hour
Evaluating a Software Architecture, evaluate Architecture, What Qualities Can We Evaluate an Architecture?, Outputs of an Architecture Evaluation, Evaluating the Architecture – ATAM, Participants and Outputs
of ATAM, Phases of ATAM, CASE Study for ATAM, Evaluating the Architecture – CBAM, Decision-Making Context, Basis for the CBAM - Case Study A, Evaluating Software Architecture - SAAM D, SAAM
Evaluation Process, Evaluating Software Architecture – ARID, ARID Evaluation Process
Unit-4 - Design Process 12 Hour
Introduction to Design Process, Design Strategy, Describing the design process the D-Matrix,, Views associated with D-matrix, Design by top-down decomposition, Design by composition, Function-oriented
design, Object-oriented design, Aspect Oriented Design, Design Metrics - Need for Metrics, WMC –DIT, NOC – CBC, RFC- LCOM

147
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Design Patterns 12 Hour
Introduction to Design Pattern, Component of Design Pattern – Types, Creational Design Pattern - Abstract Factory Pattern, Factory Method, Singleton Pattern, Structural design Pattern – Types, Adaptor
pattern, Decorator Pattern, Proxy Pattern, Behavioral Design Pattern – Types, Observer Pattern, Strategy Pattern, Iterator pattern, Introduction to ADL, Components of ADL- Example, Future Directions in
Architecture
Practice
Lab1: Introduction to Design patterns. Describe the organization of catalogue along with the following Lab 5: Program to implement Composite design pattern
design patterns. a. Creational Patterns. b. Structural Patterns. c. Behavioral Patterns.(Use case Lab 6: Program to implement decorator pattern
Diagram for Scenario to work on future Labs) Lab 7: Program to implement proxy design pattern.
Lab2: Program to implement Factory pattern. Lab 8: Program to implement Iterator Design pattern
Lab3: Program to implement abstract factory. Lab 9: Program to design mediator pattern
Lab4: Program to implement Singleton pattern Lab 10: program to implement visitor pattern.

1. Len Bass, Paul Clements, & Rick Kazman. Software Architecture in Practice (Third 6. Jason McC. Smith, ―Elemental design Patternsǁ. Addison Wesley, 2012 VasudevaVarma,
Edition). AddisonWesley,2013 Software Architecture: A Case Based Approach. Pearson Education,2009.
2. Mark Richard, Neal Ford. Fundamentals of Software Architecture: An Engineering 7. Adrian Ostrowski, Piotr Gaczkowski · “Software Architecture with C++ - Design Modern Systems
Approach, O’Reilly, 2020 Using Effective Architecture Concepts, Design Patterns, and Technique with C++”, Packt
Learning
3. Humberto Cervantes, Rick Kazman, Designing Software Architectures: A Practical Publishing, 2021.
Resources
Approach. Pearson Education,2016 8. Essential Software Architecture (2. Ed.).
4. CarlosOtero,"Software Engineering Design: Theory and Practice", CRC Press, 2012. 9. https://www.researchgate.net/publication/220690558_Essential_Software_Architecture_2_ed,
5. Paul Clements, Rick Kazman, Mark Klein, Evaluating Software Architectures: Methods 2011.
and Case Studies. Addison Wesley; 1 edition (22 October2001)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - 10% 10% -
Level 2 Understand 20% - - 20% 20% -
Level 3 Apply 30% - - 30% 30% -
Level 4 Analyze 20% - - 40% 40% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Mariappan Vaithilingam, Engineering Leader Amazon, [email protected] 1. Dr.B. Dhanalakshi, AP-CSE, BS Abdul Rahman Crescent, Chennai. 1. Mrs. Sasi Rekha Sankar, SRMIST
2. Mr. Badinath, SDET, Amzon, [email protected]

148
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC403T SOFTWARE MEASUREMENTS AND METRICS C PROFESSIONAL CORE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: familiarize with different metrics used in different process levels 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: apply metrics knowledge to measure engineering problems

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: improve their ability in making decisions via continuous practice like assessment and usage of metrics

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: design, implement, and change metrics based on industry practice

Environment &
Sustainability
CLR-5: discuss current research trends in software metrics

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand and measure the software features 2 2 - - - - - - - - - - - - 3
CO-2: understand the need of software quality 3 3 - - 3 - - - - - 2 - 2 - -
CO-3: will be able to understand the software development tools 3 2 2 - - - - - - - 2 - - - -
CO-4: evaluate the stages of process improvement and its necessities in Development Life Cycle - 2 - - 3 - - - - - - - 2 - -
CO-5: apply the process quality models in development life cycle - 2 - - - - - - - - - - - - -

Unit-1 - Introduction 9 Hour


Software Sizing Metrics- Fundamentals in Measurement- Basic Measures- Reliability and Validity- Measurement Errors- Assessing Reliability- Evolution in software Metrics- Functional Size Measurements- Cost of
counting function point metrics- Software measures and metrics not based on function points- Future Technical Developments in Functional Metrics- Case Study to Measure software size using various size Metrics
Unit-2 - Metrics and Models 9 Hour
Complexity Metrics and Models- Lines of Code- Halstead’s Software Science- Cyclomatic Complexity- Syntactic Constructs- Structure Metrics- Case Study for the usage of complexity metrics with tools- Testing
Metrics: Test Progress S Curve- Testing Defect Arrivals Over Time- Product Size Over Time- CPU Utilization- Effort/Outcome Model- Case Study to apply Testing metrics
Unit-3 - Sampling Methods 9 Hour
Customer Satisfaction Surveys: Methods of survey data collection- Analyzing Satisfaction with practice- Satisfaction with Company terms- Metrics for Object-Oriented Projects with tools- Concepts and Constructs-
Design and Complexity Metrics- Lorenz Metrics and Rules of Thumb- CK OO Metrics Suite- Productivity Metrics- Case Study for the usage of Object-oriented metrics with tools
Unit-4 - Software Quality Model 9 Hour
Software Quality - Five steps to software quality control- Product Quality Metrics with practice- In-Process Quality Metrics- Metrics for Software Maintenance- shikawa's Seven Basic Tools with practice- Defect
removal Effectiveness- The Rayleigh Model- Reliability Growth Models - Jelinski Moranda Model- Goel-Okumoto Model- Musa-Okumoto Model
Unit-5 - Software Process Assessment 9 Hour
Conducting In-Process Quality Assessments- The Preparation Phase- The Evaluation Phase- The Summarization Phase- Conducting Software Project Assessments- Audit and Assessment- Software Process
Maturity Assessment and Software Project Assessment- Software Process Assessment Cycle- Measures and metrics of industry leaders- Measures and metrics of industry leaders- Measures, Metrics, Innovation-
Measurements, Metrics and outsource Litigation- Software Process Improvement Sequences- Measuring Process Maturity- Measuring Process Capability

149
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Stephen H. Kan, “Metrics and Models in Software Quality Engineering”, Addison Wesley,Second 4. Naresh Chauhan, “Software Testing Principles and Practices”, Oxford University
Edition,2020 Press, 2010.
Learning
2. CaperJones,“AppliedSoftwareMeasurement:GlobalAnalysisofProductivityandQuality”,Third 5. RavindranathPandianC,“SoftwareMetricsAGuidetoplanning,Analysis,andApplication”,
Resources
edition, McGraw Hill Companies,2020 Auerbach,First Indian Reprint,2011
3. MarkLorenz, JeffKidd,“Object-OrientedSoftwareMetrics”,PrenticeHall,2000

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 30% - 40% - 40% -
Level 3 Apply 40% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Girish Raghavan, Senior DMTS Member, Wipro Ltd. 1. Dr.N.Prakash, Associate Professor, Department of Information 1. Mrs.B.Jothi SRMIST
technology, B.S.A Crescent Institute of Science and Technology.

150
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC404T SOFTWARE VERIFICATION AND VALIDATION C PROFESSIONAL CORE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: provide an understanding of concepts and techniques for testing software 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: prepare test plan based on the requirement document, design test plans and document test plans

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


CLR-3: design test cases suitable for a software development in various domains

Modern Tool Usage

Life Long Learning


complex problems
validate and document test cases, assuring software component or system satisfies its requirements

Problem Analysis
CLR-4:

Communication
and meets stakeholder expectations

Environment &
Sustainability
CLR-5: use of automation testing tools

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify, design different types of test cases for software development in any domain 3 3 - - - - - - - - - - - - 3
CO-2: design, develop, implement, validate, and document test plans at various levels 3 3 - - - - - - - - - - - 2 -
CO-3: develop Test cases for a given Software/System Specification 3 3 - - - - - - - - - - - - 3
CO-4: validate Test Cases with the Requirement Specifications 3 3 - - - - - - - - - - - - -
CO-5: use various automation tools to implement test cases 3 3 - - 3 - - - - - - - - - 3

Unit-1 - Introduction 9 Hour


Fundamentals of Testing: Necessity of Testing-Case Studies on “Impact of Software bugs”, Objectives of Testing, Basics Definitions, Testing Principles-Illustrations, Fundamental Test Process, The tester’s role in
a software development organization, Test Planning, Establishing Test Policy, Structured approach to testing Test Factors, Eleven Step software testing process, Origin of Defects, Defect Repository and Test
Design, Developer/Tester support of developing a defect repository, Defect Examples, Case Studies – “Identify the defect”, Defect Analysis and Prevention Strategies, Project: Developing adhoc test cases for a
case study
Unit-2 - Test Case Design Strategies 9 Hour
Test Case Design Strategies: Introduction to basic design strategies. White Box Strategies - Peer Reviews, Inspections, Walkthrough, Comparative Analysis, Static Analysis Tools: Coding Standards, Code Metrics,
Code Structure, Activity: Static Analysis of a source code, Coverage and Control Flow Graphs, Activity: Calculate Complexity for a given source code, Paths Code Complexity, Activity: Calculate Path Code Complexity
for a given source code, Evaluating test adequacy criteria, Case Studies-“Applying the suitable White Box Strategy”, Black Box Testing Strategies: Requirements Based Testing, Random Testing, Boundary Value
Analysis, Equivalence Class Partitioning, Cause Effect graphing , Activity: Designing test cases for the given requirement specification using Boundary value analysis and Equivalence Class Partitioning, cause effect
graphing and developing decision tables
Unit-3 - Levels of Testing 9 Hour
The need for levels of testing, Unit Testing: Planning, Test Harness , Running the tests Recording Results , Integration Testing: Goals, Design and Plan, Integration Testing: Goals, Design and Plan, Performance
Testing, Stress Testing ,Configuration Testing, Security Testing, Recovery Testing, Reliability Testing, Usability Testing, Regression Testing, Alpha, Beta and Acceptance Testing, Role of use cases in testing,
Applying Testing Skills: Compatibility testing, Internationalization testing, Testing Documentation plan, Recording test cases, Reporting and Measurement of Success

151
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Test Management 9 Hour
Test Management: Choice of Standards, Infrastructure Management, Test People Management, Test Plan Components, Test Plan Attachments, Locating Test Items, Managing Issues, Addressing Perception,
Taking team together, Document Uses and Types, Test Analysis report Documentation, Analyze reports and Problem tracking, Controlling and Monitoring Test Progress, Test Metrics and measurements: Role, need
and types, Project Metrics with Practice, Progress Metrics with Practice, Productivity Metrics with Practice
Unit-5 - Software Test Automation 9 Hour
Software Test Automation: Skills and Scope Design, Architecture for Automation, Requirements for a test tool, Process Model for Automation, Selecting the test tool, Demonstration of a Functional Testing Tool,
Demonstration of a Web Testing Tool Demonstration of a Unit Testing Tool, Demonstration of an Test Management Tool , Challenges in Automation, The Future: Software Quality Assurance

1. Srinivasan Desikan and Gopalaswamy Ramesh, “Software Testing – Principles and 4. Aditya P. Mathur, “Foundations of Software Testing _ Fundamental Algorithms and
Learning Practices”, Pearson Education, 2006 Techniques”, Dorling Kindersley (India) Pvt. Ltd., Pearson Education, 2008
Resources 2. Ron Patton, “Software Testing”, Second Edition, Sams Publishing, Pearson Education, 2007. 5. Renu Rajani, Pradeep Oak, “Software Testing-Effective Methods, Tools and Techniques”,
3. Ilene Burnstein, “Practical Software Testing”, Springer International Edition, 2003. Tata McGraw Hill Education, 2011.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 30% - 40% - 40% -
Level 3 Apply 40% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. ShrikantSatyanarayan, Technical Manager LDRA Technology PVT LTD 1. Dr. N. Bhalaji, Associate Professor, SSN Institutions 1. Mrs. Anupama.C.G, SRMIST
2. Mr. Girish Raghavan, Senior DMTS Manager, Wipro Technologies 2. Mr. Arun C , SRMIST

152
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Elective Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

153
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE275T REQUIREMENTS ENGINEERING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: identify the sources, collect, organize, and classify the requirements 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: improve their ability to choose the appropriate Elicitation Techniques for any systems

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


CLR-3: familiarize with the various requirements documentation and validation techniques

Modern Tool Usage

Life Long Learning


complex problems
familiarize with the various requirements quality drivers, Traceability models and requirements change

Problem Analysis
CLR-4:

Communication
control techniques

Environment &
Sustainability
CLR-5: expose to the Conflicts, Escalation model, Settlements, Analytics of Cost Benefit analysis and tools

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the knowledge on identifying the Source, organizing, and classifying requirements 3 3 - 1 - - - - - - - - - - -
CO-2: acquire the ability to identify and apply the appropriate Elicitation Techniques for any systems 3 3 - 2 1 - - - - - - - - 1 3
CO-3: understand the basic ideas about various requirements documentation and validation techniques 1 2 - 2 1 - - - - - - - - 1 3
apply the knowledge on various requirements quality drivers, Traceability models and requirements
CO-4: 3 3 - 3 1 - - - - - - - - - -
change control techniques for any system
appreciate the concepts of Conflict, Escalation model, Settlements, Analytics of Cost Benefit analysis
CO-5: 3 3 - 3 1 - - - 1 - - - - - 3
and requirements engineering tools

Unit-1 - Requirement Engineering 9 Hour


Introduction to Requirements and Requirements Engineering, Requirements Types, Classification of Requirements , Requirements Gathering relevant to Software Life Cycle Models, Stakeholders in the
requirements, Requirements Engineering Process Framework, Requirements Engineering Maturity Model process, Generic Process for requirements, Levels of Requirements Engineering, System Model for
Requirements Engineering, Representation of Requirements-Data Flow, ER Diagram, View Point Controlled Requirements, Structured Analysis and Design Technique, Viewpoint Oriented Requirements Definition,
0bject Oriented Methods of Requirements Engineering, Case Study : For the given application identify the stakeholders, gather and classify the requirements according to the types
Unit-2 - Elicitation 9 Hour
Requirement Inception, sources of requirements, Introduction to requirement Elicitation, Classical Elicitation Techniques-Interview, Questionnaire, Social analysis, Modern Elicitation Techniques- Brainstorming,
Modern Elicitation Techniques- Prototyping, Use Centered Design, Modern Elicitation Techniques- Walkthrough, Use case Joint Application Development, Requirement reuse, Feature Oriented Domain Analysis,
Case Study: For the given application apply various techniques and Elicitation the requirements
Unit-3 - Documentation 9 Hour
Introduction to Requirement Document, Structure of Document, Vision, Scope and Elicitation notes, Requirement Specification techniques, Introduction to requirement validation- Classical Requirement Validation
techniques-Inspection, Simple Check, . Introduction to requirement validation- Classical Requirement Validation Techniques-Desk Check, Walkthrough, Format review, Prototype & Enactments, Functional test
Design, Development of User manual, Case study. For the given application validate and document the specifications

154
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Traceability 9 Hour
Business drivers of Quality-components of Integrated Quality approach, Quality improvement techniques, Requirements Quality Assurance, PDCA Cycle, Introduction to Requirement Management- Requirement
Identification-Requirements Traceability, Requirement Traceability models, Traceability Matrix- Traceability List & Tree, Introduction to Requirement Traceability- Requirement traceability methods, Advance
Traceability, Requirement Change Control
Unit-5 - Conflicts & Cost Benefit Analysis 9 Hour
Conflict types, Mastering and using detection of the 5 conflicts types on the basis of indication in project, Glasl‘s conflicts escalation model, Conflicts Settlement techniques, Analytic Methods – Mastering and using
Consider All Facts (CAF), Analytic Methods – Plus –Minus- Interesting(PMI), Analytic Methods – Cost Benefit Analysis, Case study : Requirement Engineering Tools

1. ElizabethHull,KenJackson,JeremyDick,RequirementsEngineering,Springer,2013 5. A, Laplante, Mohamad h. Kassab, Requirements Engineering for Software and


2. RalphR.Young,"TheRequirmentsENgineeringHandbook",2004 Systems, CRC Press, 2022
Learning 3. Axelvan Lamsweerde,"Requirements Engineering: From System Goalsto UMLModelsto Software 6. Jeremy Dick, Elizabeth Hull, Ken Jackson, Requirements Engineering, Springer
Resources Specifications" , Wiley,2014 International Publishing, 2018.
4. KarlWiegers, JoyBeatty, Software Requirements (DeveloperBestPractices) (3rdEdition), Microsoft 7. Requirements Engineering – Springer E-Learning Material,
Press, 2014. https://www.springer.com/journal/766

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 30% - 40% - 40% -
Level 3 Apply 40% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Mariappan Vaithilingam, Engineering Leader Amazon, [email protected] 1. Dr.B. Dhanalakshi, AP-CSE, BS Abdul Rahman Crescent, Chennai. 1. Mrs. Sasi Rekha Sankar, SRMIST
2. Mr. Badinath, SDET, Amzon, [email protected]

155
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE276T SOFTWARE QUALITY MANAGEMENT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the fundamentals of Software Quality and its standards 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: introduce the concepts of Software Engineering principles

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gain Knowledge on Quality tasks and testing

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: become familiar with the elements of the quality management system and quality tools

Environment &
Sustainability
CLR-5: learn the basics of TQM and quality systems

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the concepts of software quality factors and its challenges 3 2 1 - - - - - - - - - - 1 -
CO-2: understand the characteristics of Software Quality Assurance 3 2 2 - - - - - - - - - - 1 3
CO-3: solve the issues in quality tasks and testing 3 1 1 - - - - - - - - - - 2 3
CO-4: articulate the elements of quality management system and software quality tools 3 1 2 - - - - - - - - - - 1 3
CO-5: utilize the concepts of TQM and quality systems 3 2 1 - - - - - - - - - - 2

Unit-1 - Introduction 9 Hour


Software Quality - The Software Quality Factors and Challenges - Quality measurement – Metrics measurement and analysis – Gilb’s approach - Demystifying Quality Concepts - Software Quality Processes (Agile
Methods) – role of process frameworks - methodologies and tools – CMM and CMMI – Seven QC Tools - Six Sigma concepts
Unit-2 - Software Engineering Principles 9 Hour
Introduction to Software Engineering principles - Software Project Management - Software Processes - Project Metrics - Process Metrics – object-oriented metrics – Software Configuration management – importance
of SCM - SCM processes– Identification of objects in SCM – version control – change control – configuration audit – status reporting - SCM Tools - Risk Management -
Unit-3 - Quality Tasks and Testing 9 Hour
Quality tasks - SQA Activities – defect prevention and defect detection - defect measurement and analysis - Software Testing – Testing strategies—white-box and black-box testing—introducing Usage Based
Testing and Coverage Based Testing – Testing Techniques - Partition Based Testing, Testing based on Check-lists, Usage Based Statistical Testing and Coverage Based Testing - Reviews and Inspections –
walkthroughs - Fault Tolerance Basics – Fault Tolerance Techniques- Review of SQA activities in the Organization - Analyse cost of SQA activities Vs overall software development effort - trade-offs in cost-of-
quality vs cost-of-delivery; Case Study - Testing
Unit-4 - Software Quality Tools 9 Hour
Tools for Quality – Ishikawa’s basic tools – CASE tools – Defect prevention and removal – Quality Planning in Projects - Quality Plan document - Quality Metrics and Base lining - measurement and control in
project management - S.M.A.R.T attributes - Software Product Metrics & Defect Propagation - Internal vs. External software attributes - types of product metrics (Static vs. Dynamic) - Reliability models – Rayleigh
model – Reliability growth models for quality assessment - Elements of QMS – planning the implementation of QMS - The quality charter – changing the organizational culture – Organizational considerations –
development organization considerations – Implementation strategies – SQS improvement - Reliability Growth models for QMS – Complexity metrics and models – Customer satisfaction analysis; Case Study -
Software Quality Tools

156
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - TQM and Quality Systems 9 Hour
Introduction to TQM - Software reuse for TQM - Software testing methods for TQM - Defect prevention and TQM - Zero defect software development - Clean Room Engineering – Benefits of ISO registration – ISO
9000 series of standards – sector specific standards - AS 9100, TS16949 and TL 9000-- ISO 9001 Requirements—Implementation— Documentation—Internal Audits—Registration. ENVIRONMENTAL
MANAGEMENT SYSTEM: Introduction—ISO 14000 Series Standards—Concepts of ISO 4001—Requirements of ISO 14001—Benefits of EMS - GQM Model - Hierarchical models of Boehm and McCall –- role of
process frameworks

1. Nitin C Shah, “Software Quality Assurance and Testing for Beginners”, 2019. 7. Roger pressman “Software engineering” 5th edition McGraw hill 1999.
2. Besterfield Dale H., Besterfield Carol, ET "al., “Total Quality Management (TQM)” 5e 8. G.Gordan Schulmeyer, James “Total Quality Management for software” International Thomson
by Pearson by 2018. computer press 1998.
3. Jeff Tian, “Software Quality Engineering”, Wiley India, 2015. 9. http://www.sei.cmu.edu/cmmi/
Learning 4. Allan C. Gillies, “Software Quality: Theory and Management”, Thomson Learning, 10. http://www.scs.shtr.org/pcmm1.html
Resources 2003. (UI: Ch 1-4 ; UV : Ch 7-8) 11. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA512354
5. Stephen H. Kan, “Metrics and Models in Software Quality Engineering”, Pearson 12. http://www.isixsigma.com/new-to-six-sigma/getting-started/what-six-sigma/
Education (Singapore) Pte Ltd., 2002. (UI: Ch 3-4; UIII: Ch 5-8; UIV: Ch 9-11). http://www.iso.org/iso/catalogue_detail?csnumber=21823
6. Watt S Humphery “Managing software process”, Addison – Wesley 1998. 13. http://www.math.mun.ca/~variyath/7QC.pdf
14. http://www.softwaresixsigma.com/PDFs/0103%20NjSpin1.pdf

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 30% - 40% - 40% -
Level 3 Apply 40% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.R. Durairaj, Clayfin Technologies Private Limited, Chennai 1. Dr.M.S. Bhuvaneswari, Asso. Professor, Mepco Schlenk 1. Dr.R. Beaulah Jeyavathana, SRMIST
Engineering College, Sivakasi

157
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE277T SOFTWARE PROCESS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic concepts of software Process 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: discuss various Phases of Software Process and its Economics

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: acquire Knowledge on Process Workflow and Planning

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the knowledge of process metrics and Risk Management

Environment &
Sustainability
CLR-5: gain knowledge using SPM case studies

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the Knowledge of various software process maturity models 3 - - - - - - - - - - - - 2 -
CO-2: understand the software economics and different phases 3 - - - - - - - - - - - - 2 3
CO-3: apply the knowledge of software Process checkpoints and workflows 3 - - - - - - - - - - - - 1 3
CO-4: identify the various risks in Process Metrics 3 - - 2 - - - - - - - - - 1 -
CO-5: design and Develop software Products using conventional and model principles of SPM 3 - - - - - - - 2 - - - - 1 3

Unit-1 - Software Process 9 Hour


Maturity Software Maturity Framework, Principles of Software Process Change, Software Process Assessment, The Initial Process, The Repeatable Process, The Defined Process, The Managed Process, The
Optimizing Process. Process Reference Models Capability Maturity Model (CMM), CMMI, PCMM, PSP, TS
Unit-2 - Software Project 9 Hour
Management Renaissance Conventional Software Management, Evolution of Software Economics, Improving Software Economics, The old way, and the new way. Life-Cycle Phases and Process artifacts
Engineering and Production stages, inception phase, elaboration phase, construction phase, transition phase, artifact sets, management artifacts, engineering artifacts and pragmatic artifacts, model-based software
architectures.
Unit-3 - Work Flows and Process Planning 9 Hour
Workflows and Checkpoints of process Software process workflows, Iteration workflows, Major milestones, minor milestones, periodic status assessments. Process Planning Work breakdown structures, planning
guidelines, cost and schedule estimating process, iteration planning process, Pragmatic planning.
Unit-4 - Process and Project Metrics 9 Hour
Metrics in the Process and Project Domains, Software Measurements, Metrics for Software Quality, Risk Management: Risk versus Proactive Risk Strategies, Software Risks, Risk Identification, Risk Projection,
Risk Refinements, Risk Mitigation Monitoring and Management (RMMM), The RMMM Plan
Unit-5 - Case Studies 9 Hour
CCPDS-R Case Study and Future Software Project Management Practices Modern Project Profiles, Next-Generation software Economics, Modern Process Transitions

158
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Managing the Software Process, Watts S. Humphrey, Pearson Education,1989 4. Software Engineering, A practitioner’s Approach- Roger S. Pressman, 6th edition, Mc Graw Hill
Learning 2. An Introduction to the Team Software Process, Watts S. Humphrey, Pearson International Edition
Resources Education, 2000 5. Software Project Management, Walker Royce, Pearson Education
3. Process Improvement essentials, James R. Persse, O’Reilly, 2006 6. Software Engineering principles and practice- Waman S Jawadekar, The Mc Graw-Hill Companies.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 30% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.R. Jaya, Data Scientist, Great Learning, Bangalore. 1. Dr.R. Senthilkumar, Associate professor, Dept of CSE, New Horizon 1. Dr. Dinesh G, SRMIST
college of Engineering, Bangalore.
2. Dr.N. Thillai Arasu, Associate Professor, School of CSE &IT, Reva
University, Bangalore

159
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE271T PROGRAMMING IN JAVA E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce the fundamental concepts and programming environment 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: outline the Concepts of classes and IO streams

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: acquire Object oriented concepts like inheritance, reusability, and encapsulation

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
learn the custom exceptions and employ concurrency concepts

Communication
CLR-4:

Environment &
Sustainability
CLR-5: exploit the power of advanced data structures and basic GUI design

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: summarize the knowledge of fundamentals of Java Programming 3 - 1 2 - - - - - - - - 1 1 -
CO-2: determine the type of constructor and class concepts used in OOPS based programming paradigms 3 2 - 2 - - - - - - - - 2 - -
CO-3: articulate the different concepts involved in information hiding and reusability techniques 3 2 1 - - - - - - - - - 3 2 -
CO-4: understand the different concepts of Exception Handling and Concurrency topics 3 2 1 - - - - - - - - - - - -
CO-5: acquire the integration of Collection Frameworks and GUI programming to product development 3 2 - 1 - - - - - - - 1 - - -

Unit-1 - Fundamentals of Java Technology and Programming 9 Hour


Java platform features, Java technologies-JSR, JCP, Data types, Key words, and Scoping rules, Automatic Type Conversion, Type Casting and Arrays, Operators Precedence & Associativity, Expression. Flow
control, enhanced for loop, switch statements, String handling
Unit-2 - Classes, Objects and Streams 9 Hour
Class fundamentals: Declaring objects, Assigning object reference variable, Methods & Method Signatures, Method with parameters, Variable arguments, I/O Basics: Byte stream& Character Stream, Getting user
input: Reading console input & Writing console output, Reading and Writing files, Command Line arguments, Constructors and its Types, this keyword, Garbage Collector, finalize() method, Overloading methods
and constructors, Using object as parameters, returning object in methods, recursion, Access control, static and final keyword, Nested and Inner classes.
Unit-3 - Information Hiding and Reusability 9 Hour
Inheritance basics, Using super, Method Overriding, Dynamic method dispatch, Abstract class, Using final with inheritance, Default Package, Path & Class Path Environment Variables, Package level access,
Importing Packages, Interface: Multiple Inheritance, Extending interface, Wrapper Class, Auto Boxing.
Unit-4 - Exception, Concurrency, Enumeration and Annotations 9 Hour
Exception handling mechanism, try/catch mechanism, Thread class & Runnable Interface, Inter Thread Communication, Synchronization of threads using Synchronized keyword and lock method, Thread pool and
Executors framework, Futures and callable, Fork-Join, Deadlock conditions, Enumeration, Annotations: basics of annotation.
Unit-5 - Generics, Collections Framework and GUI Programming 9 Hour
Generics: Basics, Collections Interfaces – Set, List, Queue, Collections Classes – Array List, Hash Set, Tree Set. Abstract Map, Hash Map, Tree Map, Introduction to GUI and its component basics

160
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Herbert Schildt, “The Complete Reference (Fully updated for jdk7)”, Oracle press Ninth Edition, 2014. 4. HerbertSchildt, “Java: A Beginner's Guide”, Eight Edition, Oracle Press, 2018.
Learning
2. Cay S. Horstmann, “Core Java Volume –I Fundamentals”, Prentice Hall, 11th Edition, 2018. 5. https://docs.oracle.com/javase/tutorial
Resources
3. Deitel&Deitel, “Java How to Program”, Prentice Hall, 10th Edition, 2016. 6. NPTEL Course: https://onlinecourses.nptel.ac.in/noc22_cs47/preview

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 35% - 30% - 30% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 25% - 30% - 30% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Jero Terrence, Assistant Consultant in Tata Consultancy Services, United Kingdom 1. Dr.R.Ganeshan, VIT Bhopal, Madhya Pradesh. 1. Dr.S.Amudha, SRMIST

161
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE391P USER INTERFACE DESIGN E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the concepts of design; Utilize by learning various color models 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: learn the fundamental laws in UX design

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the task for requirement gathering

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: gain guidelines for UI design

Environment &
Sustainability
CLR-5: design on various domains or applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: design the concepts of various color models - - 2 - - - - - - - - - - - -
CO-2: apply the basic laws in UX design - - 2 - - - - - - - - - - 2 -
CO-3: construct the task for requirement gathering - - 3 2 - - - - - - - - 2 -
CO-4: adopt the guidelines for UI design - - 3 - - - - - 2 - - - - - 3
CO-5: apply the design on real time applications - - 3 - - - - - 2 - 3 - - - 3

Unit-1 - Typography 9 Hour


type properties, baseline, cap height, X-height, ascenders, descenders and weight, Font classifications-Serif, sans serif fonts, handwriting and Display, Readability, letter spacing, line height, Paragraph spacing,
power of alignment, Leading and Kerning, Color Models Introduction-RGB, CMYK, Color harmony: monochromatic, analogous, Complementary, triadic, double-complementary.
Practice:
1: Creating sample standard webpage for restaurant to order items by satisfying the fonts, colors and spacing
2: User Interfacing check by applying option buttons/ menus in it using Node JS/ Angular JS
3: Various color models checking in the developed page
Unit-2 - Laws of UX Designing 9 Hour
Hicks law, Jakob’s law, Fitts’s Law, Ockham’s Razor, Pareto Principle, Weber’s law, Tesler’s law, Law of proximity, Law of similarity and human eye
Practice:
1: Applying Hicks Law, Jakob’s law, Ockham’ Razor in a sample ecommerce webpage designed
2: Applying Weber’s law, Tesler’s law in the webpage
3: Variations to be done for demonstrating the law of similarity colors in various designs/buttons and human eye
Unit-3 - Design 9 Hour
Interaction design task analysis, Data for task requirements, Requirements gathering, Eliciting Qualitative data, analyzing qualitative data, Qualitative metrics User narratives, Scenario implementation and its
challenges, Wireframes, Prototypes, UX design for mobile application, Application design example, Responsive Design, Adaptive design and difference with Responsive design
Practice
1: Interaction design analysis in the webpage designed, 2: Compatibility check with both Web and Mobile application oriented, 3: Browser independent check along with database connectivity
162
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Guidelines 9 Hour
Universal usability, Inclusive interaction, principles of accessibility, Universal design, Font weight, color, Contrast, Screen readers, Alt text using a tool, Introduction to Multifaceted Users, Designing for Multifaceted
Users, Guidelines for helping adults
Practice
1: Designing a sample chatbot web page and check for lightweight and heavyweight components with various frames in webpage
2: Design check for Multifaceted users, 3: To check whether the guidelines to adult users are followed
Unit-5 - Case Study 9 Hour
Tracking APP Introduction, Tracking APP Design guidelines, Tracking APP demo, Introduction of how to Design a new UX, concept to reduce driver distraction, Designing concepts of Driver distraction, Importance
of User data in UX designing, Approach to design without user data, Designing concept, Dynamic web pages
Practice
1: Building a webpage for vehicle booking with location enabled, 2: Track the Vehicle by its location and display it in your app, 3. Calculate the amount after travel with its tariff

1. Jeff Johnson, Kate Finn- “Designing user Interfaces for an aging population towards 3. Andrew Rogerson- “User Experience Design” – Smashin media 2012- Freiburg, Germany
Learning
Universal design- Morgan Kauffman publishers – Elseiver- 2017 4. Barbara Ballard, “Designing the mobile user experience” Wiley publicatoins 2007
Resources
2. Elvis Canziba- “Hands-on UX Design for Developers “ – PacktBirminiham, mumbai -2018 5. https://uxdesign.cc/tagged/case-study

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Project Based Learning Report and Viva Voce Final Examination
Bloom’s
CLA-1 Average of unit test CLA-2 (20%) (0% weightage)
Level of Thinking
(20%) (60%)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - - 20% - 40% - -
Level 2 Understand 40% - - 20% - 40% - -
Level 3 Apply 10% - - 20% - 10% - -
Level 4 Analyze 10% - - 20% - 10% - -
Level 5 Evaluate - - - 10% - - - -
Level 6 Create - - - 10% - - - -
Total 100 % 100 % 100% -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Joe Antony, Senior Manager, Cognizant 1. Dr.T.Sukumar, Associate Professor, SVCE 1. Dr.S.Karthick, SRMIST
2. Mr.Sasiram, Senior Software Engineer, TCS 2. Dr.P.Sudakar, Associate Professor, Annamalai University

163
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE392P VISUAL PROGRAMMING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: gain knowledge about Visual basics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: utilize object-oriented aspects of C# to develop applications

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: design Windows applications utilizing forms, menus etc.

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: create Database applications using ActiveX Data Objects

Environment &
Sustainability
CLR-5: utilize web forms to develop Web based applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: design and develop concept in visual basic programming - - 3 - 1 - - - - - - - - - -
CO-2: develop applications using object-oriented aspects of C# - - 2 - 2 - - - - - - - - - -
CO-3: design Windows applications - - 2 - - - - - 2 - - - - 2 3
CO-4: design Data base applications - - 3 - - - - - 2 - - - - 2 3
CO-5: develop Web based applications using ADO .Net - - 2 - 2 - - - 2 - 3 - - 2 3

Unit-1 - Visual Basic Programming 9 Hour


Visual Basic Applications – Creating and using Controls – Menus and Dialogs – Managing projects – Programming fundamentals – Objects and instances – Debugging – Responding to mouse events – Using grid
control – Creating graphics for application – Displaying and printing information – Interacting with the environment – File system controls - Processing files – Accessing databases with the data controls.
Practice:
1. Create an Application using VB, 2. Create Menus, Dialogs, and mouse Events, Create and implement to Access databases with the data controls
Unit-2 - Introducing C# 9 Hour
Understanding .NET Framework - Overview of C# - Literals – Variables Data Types – Operators – Constants – Expressions, Program Control Statements: Branching, Program Control Statements: Looping, Casting
– Methods, Arrays: Array Class, Array List, String, String Builder, Structures – Enumerations, Class – Objects, Constructors, Inheritance, Indexers and Properties, Polymorphism, Interfaces, Abstract Class, Event
Handling, Errors, and Exception Handling.
Practice:
1. Implementing Visual Studio IDE with Decompiling Code, 2. Create an simple application using C#, Develop an exception handling with polymorphism
Unit-3 - Building Windows Application 9 Hour
Creating Window Forms with Events and Controls, Examples: Window Forms with Events and Controls, Menu and Toolbar, Delegates - Inheriting Window Forms, SDI and MDI application, Dialog Box: Modal and
Modeless.
Practice:
1. Create windows form with menu and Toolbar, 2. Create Windows application using C#., Create Simple SDI and MDI application

164
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - ADO .NET 9 Hour
Accessing data with ADO.NET: Dataset, Types Dataset, Data Adapter, and Updating Database using Stored Procedures, SQL Server with ADO.NET, Handling Exceptions, Validating Controls, and Windows
Application Configuration.
Practice:
1. Create a Database connectivity using SQL Server, 2. Apply Exception handling concept. Create an application using Validation control.
Unit-5 - ASP.NET 9 Hour
Introduction to ASP.NET, - Working with XML and .NET, Creating Virtual Directory and Web Application, Session Management, Web Services – web.config, Passing Datasets and Returning Datasets from Web
Services, Transaction Handling, Exception Handling – Returning Exceptions from SQL Server
Practice:
1. Implement a server with session management. 2. Create a dataset with passing and returning with SQL Server., 3. Write a simple ASP.NET program to display the following Web Controls:
A button with text “click me”. The button control must be in the center of the form. A label with a text hello, A checkbox. The form name must be Web Controls

1. Herbert Schildt, ―The Complete Reference: C# 4.0ǁ, Tata McGraw Hill, 2012. 3. Christian Nagel et al. ―Professional C# 2012 with .NET 4.5ǁ, Wiley India, 2012.
Learning
2. Andrew Troelsen, Philip Japikse, ―C# 6.0 and the .NET 4.6 Frameworkǁ, Seventh 4. Andrew Troelsen, Philip Japikse , ―Pro C# 7 with .NET and .NET Coreǁ, Eigth Edition, Apress, 2017
Resources
Edition, Apress, 2015 5. Stephen C. Perry, ―Core C# and .NETǁ, Prentice Hall, 2005

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Project Based Learning Report and Viva Voce Final Examination
Bloom’s
CLA-1 Average of unit test CLA-2 (20%) (0% weightage)
Level of Thinking
(20%) (60%)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - - 20% - 40% - -
Level 2 Understand 40% - - 20% - 40% - -
Level 3 Apply 10% - - 20% - 10% - -
Level 4 Analyze 10% - - 20% - 10% - -
Level 5 Evaluate - - - 10% - - - -
Level 6 Create - - - 10% - - - -
Total 100 % 100 % 100% -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Naveen Baskaran, ADP Solution Chennai 1. Dr.P.SivaKumar, VIT Chennai 1. Dr.S.Nagendra Prabhu, SRMIST
2. Dr.Senthil, NHCE Bangalore

165
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE393P MACHINE LEARNING TECHNIQUES E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: explore the principles, algorithms, and applications of machine learning 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand machine learning models to perform classification on various applications

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: familiarize about neural network models to perform classification on various applications

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: gain knowledge on machine learning models to perform clustering on various applications

Environment &
Sustainability
CLR-5: understand sequence prediction models

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: evaluate machine learning models and report its performance - 1 - - - - - - - - - - - 2 2
CO-2: apply linear classifier models for text classification - 2 - - - - - - - - - - - 2 -
CO-3: design neural network models for image classification - 3 - - 3 - - - - - - - - 3 -
CO-4: design clustering models to solve real-world problems - 3 - - - - - - 2 - 3 - - 3 -
CO-5: design and analyze the sequence prediction models using recurrent neural network - 3 - - - - - - 2 - 3 - - 3 -

Unit-1 - Introduction to Machine Learning 9 Hour


What and why? supervised learning, unsupervised learning, Parametric vs non-parametric models, overfitting, model selection; Probability – Discrete random variables, Bayes rule, Independence and conditional
independence, continuous and random variables, Quantiles, mean and variance, Gaussian Normal distribution
Practice:
1. Select any numerical dataset and perform statistical analysis, 2. Perform Exploratory data analysis on the selected dataset
Unit-2 - Supervised Learning 9 Hour
Linear classifiers – Regression – linear regression- ordinary least square, ridge regression - Features –feature representation – Decision tree, Random Forest– K Nearest neighbour – Multi class classification-
Naïve Bayes classifier, Support vector machine.
Practice:
1. Use linear and ridge regression and perform prediction, 2. Perform classification on the selected dataset using Random Forest, KNN, SVM and Naïve Bayes and analyse its performance
Unit-3 - Clustering 9 Hour
Curse of Dimensionality – Principal component analysis; K-means clustering, Mixture of Gaussians- maximum likelihood, EM for Gaussian mixtures
Tutorial:
1. Perform PCA on a large dataset, 2. Categorize the dataset using K-means clustering and GMM
Unit-4 - Introduction to Neural Network 9 Hour
feed forward Network function, Network training, Error Backpropagation; Deep learning – Deep generative models, Deep neural networks, Application of deep networks
Practice:
1. Handwritten digit classification using DBN, 2. Information retrieval using deep-auto encoders, 3. Learning Image features using 2D convolutional DBN
166
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Sequential Data 9 Hour
Markov models, HMM, Recurrent neural network – sequence to sequence RNN – Back propagation through time- forward and back pass- training a language model – LSTM
Practice:
1. Develop model for the following applications: Machine translation, 2. video tagging and speech recognition

Learning 1. Machine Learning: A Probabilistic Perspective, Kevin P Murphy, MIT press, Cambridge, 2012 3. Machine Learning, Tom Mitchell McGraw-Hill (1997 A Course in Machine Learning, Hal
Resources 2. Pattern recognition and Machine Learning, Christopher M Bishop, Springer, 2006. Daume III (preprint available online)

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Project Based Learning Report and Viva Voce Final Examination
Bloom’s
CLA-1 Average of unit test CLA-2 (20%) (0% weightage)
Level of Thinking
(20%) (60%)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - - 20% - 40% - -
Level 2 Understand 40% - - 20% - 40% - -
Level 3 Apply 10% - - 20% - 10% - -
Level 4 Analyze 10% - - 20% - 10% - -
Level 5 Evaluate - - - 10% - - - -
Level 6 Create - - - 10% - - - -
Total 100 % 100 % 100% -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Vaishak P S Staff Engineering Manager/System Intelligence, 1. Dr.C. Oswald Assistant Professor, NIT, Trichy 1. Mrs.A. Jackulin Mahariba, SRMIST
Samsung Electronics, Bangalore [email protected] [email protected]

167
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE312P SOFTWARE ENGINEERING IN ARTIFICIAL INTELLIGENCE E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the different GPU Components 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: know to access NGC Containers and docker images

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: utilize the Pytorch and Juypter notebook

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn the CUDA ecosystem

Environment &
Sustainability
CLR-5: explore the DL deployments

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: distinguish the different components in GPU systems - 1 - - - - - - - - - - - - -
CO-2: create environments to work with different NGC container packages - 2 3 - - - - - - - - - 2 - -
CO-3: implement codes using jupyter notebook and pytorch - 3 3 - - - - - - - - - - 2 3
CO-4: develop and work with CUDA - 3 3 - 3 - - - - - - - - - 3
CO-5: visualize different DL deployments for various scientific applications - 2 - - 3 - - - - - - - - - -

Unit-1 - Introduction to System Software Engineering 9 Hour


System S/W Platforms: Virtualization, Containerization- Introduction to NVIDIA NGC Cloud, DockerHub
T1: Accessing DGX A100
T2: Working DOCKER Images and NGC Container
T3: Installation and Pulling Specific NGC Packages
Unit-2 - Scheduling and Resource Management 9 Hour
Introduction to Schedulers/Orchestration Tools - Fundamentals of Ansible/Kubernetes/KubeFlow/SLURM
T4: Implementing and executing Kubernetes
T5: Working with Ansible
T6: Demo Executions on Kubeflow/SLURM
Unit-3 - Introduction to IDE / Exploratory Programming 9 Hour
Introduction to various IDE like VSCode/PyCharm/Others-Introduction to Jupyter-Ecosystem for Exploratory Programming- Features of Jupyter-Ecosystem for building Python Packages/Scientific Manuscript
T7: Working with VScode/ Pycharm
T8: Using Jupyter note and PyTorch
T9: Run a simple data centric application using Jupyter note.

168
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - System Software for Accelerated Computing 9 Hour
ML/DL/DS/HPC Workloads-Overview of CUDA Platform: GPGPU Computing Platform - Overview of CUDA-X Platform: cuBLAS/cuDNN/cuTensor [Compute]- Framework for Differential Computation
T10: Testing the GPGPU Computing
T11: Testing and working with Tensor (CUDA-X)
T12: Implementing Mixed Precision and Quantization Aware training
Unit-5 – GPU Programming 9 Hour
Distributed Computing Software Stack-Multi-GPU/Multi-Node: [MPI/NCCL/RDMA] Horovod- Accelerating DL Deployments- MLOps: Hands-on
T13: Accelerating Neural Network Inferencing: TensorRT & Triton Inference Server
T14: Monitoring load Balancers & Schedulers
T15: Deployment of various services for monitoring, jupyter environment and other services.

1. Ekman, M., 2021. Learning Deep Learning: Theory and Practice of Neural Networks, Computer 3. Sanders, J. and Kandrot, E., 2010. CUDA by example: an introduction to general-purpose
Learning
Vision, NLP, and Transformers Using TensorFlow. Addison-Wesley Professional. GPU programming. Addison-Wesley Professional.
Resources
2. Christopher Love, Jay Vyas, Core Kubernetes, 2022 4. Chollet, F., 2021. Deep learning with Python. Simon and Schuster.

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Project Based Learning Report and Viva Voce Final Examination
Bloom’s
CLA-1 Average of unit test CLA-2 (20% weightage) (0% weightage)
Level of Thinking
(20%) (60%)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - -- 15% - 15% - -
Level 2 Understand 25% - - 20% - 20% - -
Level 3 Apply 30% - - 25% - 25% - -
Level 4 Analyze 30% - - 25% - 25% - -
Level 5 Evaluate - - - 10% - 10% - -
Level 6 Create - - - 5% - 5% - -
Total 100 % 100 % 100 % -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.A.G.Rangaraj,Deputy Director (Technical),R&D, RDAF and 1. Dr.I.Joe Louis Paul, Associate Professor, 1. Dr.Kottilingam K, SRMIST
SRRA Division, National Institute of Wind Energy (NIWE) SSN College of Engineering

169
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE391T OBJECT ORIENTED SOFTWARE ENGINEERING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: the purpose of learning this course is to: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquire the Knowledge of object-oriented software and development methodologies

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: improve their ability to choose the appropriate Elicitation Technique and document the requirements

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: familiarize with the various Analysis and design techniques

Environment &
Sustainability
CLR-5: practice the concepts of implementing high quality software

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: recognize object-oriented software and development methodologies 3 2 - - - - - - - - - - - - 3
CO-2: identify the appropriate Elicitation Technique and document the requirements - 3 2 - - - - - - - - - - 2 -
CO-3: apply various Analysis and design techniques - - 3 - - - - - - - - - - 2 -
CO-4: use object-oriented implementation concepts to produce quality software - 2 3 - - - - - - - - - - - 3
relate the Object-oriented testing and maintenance concepts while doing testing and maintenance of
CO-5: 2 - 3 - - - - - - - - - - - 3
software

Unit-1 - Introduction 9 Hour


Introduction to Software Engineering, Object orientation, Object oriented methodologies, Object oriented modeling, Terminologies used in object-oriented development, Object oriented Software life cycle models,
Selection of software development life cycle models
Unit-2 - Software Requirements and Estimation 9 Hour
Software requirements, Software Requirement Elicitation techniques, Initial Requirement Document, Use case Approach, Characteristics of good requirements, Software Requirement specification document, Object
oriented software Estimation: Lorenz and Kidd Estimation method, Use case points method, Object oriented function point, Case Study: For the given application apply use case approach to Elicit the requirements
and validate and document the specifications
Unit-3 - Object Oriented Analysis and Design 9 Hour
Object oriented Analysis-Structured Analysis and object-oriented analysis-Identification of class-Identification of relationships – Identifying state and behavior. Object oriented design-: Interaction diagrams-sequence
and collaboration diagrams-Refinement of use case descriptions, refinement of class, Creation of software design document, Generating test cases from use cases, Object oriented design Principles. Case study.
For the given application do Analysis and Design
Unit-4 - Object Oriented Design to Implementation 9 Hour
Activity Diagram, State chart diagram, storing persistent data in database, Implementing the class, Software quality metrics. Case study: For the given application create Activity diagram, State chart diagram
Unit-5 - Object Oriented Software Testing and Maintenance 9 Hour
Software Testing, Software verification Techniques, Functional Testing, Structural Testing, Class testing, Levels of testing, Testing Tools, Software maintenance, Categories of Software maintenance, Challenges of
Software maintenance, Maintenance of object-oriented software, Software Rejuvenation.

170
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Yogesh Singh, Ruchika Malhotra,” Object Oriented Software Engineering”, PHI 3. Gerardus Blokdyk, Object oriented Software Engineering: A complete Guide, ISBN-10 :
Learning Learning Private Ltd.,Eastern Economy Edition, 2012 1867300230, 2020
Resources 2. Stephen R. Schach,” Object-Oriented and Classical Software Engineering” Eigth
Edition, y McGraw-Hill,2011

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 30% - 30% -
Level 2 Understand 40% - 30% - 30% -
Level 3 Apply 20% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Joseph Thankarajan, CTS, Chennai 1. Dr. John T.Mesiah Dhas, Associate Professor, T.John Institute of Technology, Bangalore 1. Dr.T.S.Shiny Angel, SRMIST

171
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE392T PYTHON FOR SOFTWARE ENGINEERING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand Software Engineering and Python 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: familiarize about Software Development and Data structures in Python

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: learn GUI programming and Poplar Python packages

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: design patterns in Python

Environment &
Sustainability
CLR-5: apply Software Testing using Pytest

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain knowledge on the basics of Software Engineering and Python programming language 1 - 2 - - - - - - - - - - 1 1
CO-2: acquire knowledge on software design and development using Python 1 - 3 2 - - - - - - - - - 1 2
CO-3: familiarize working with database, GUIs, and get introduced to popular packages in Python 1 - 3 2 - - - - - - - - - 1 3
CO-4: recognize different types of design patterns and study popular patterns 1 - 3 3 - - - - - - - - - 2 3
CO-5: comprehend the use of Pytest to perform software testing 1 - 2 - 3 - - - - - 2 - - - -

Unit-1 - Introduction 9 Hour


Introduction to Software Engineering and Programming - Software Development Life Cycles - Introduction to Python - Python Setup - Download and install Python - PyCharm IDE - Create Python project in PyCharm
- Variables in Programming - Writing Programs in Python - Variables, expressions, and statements - Functions - Conditionals and recursion - Iteration
Unit-2 - Software Development Using Python 9 Hour
Software Development using Python - Modules - PIP - Try Except Blocks - Date time - Random numbers - Strings - Lists - Tuples - Dictionaries - Linked lists - Stacks - Queues - Trees - Files and exceptions -
Classes and objects - Classes and functions - Classes and methods - Inheritance – Case study application
Unit-3 - Database Operations and GUI Programming in Python 9 Hour
Crud operation Python using MySQL – Linting - GUI in Python - Tkinter Programming - Tkinter Widgets - Standard attributes - Python Tkinter Geometry - Data Visualization in Python - Creating line graph - Pie chart
- Bar Graph - Python Packages – GUI and Database operations case study
Unit-4 - Design Patterns in Python 9 Hour
Pattern Types - Creational Patterns: Singleton - Factory Method - Constructor/Builder - Structural patterns: Adapter - Decorator - Facade - Behavioral Patterns: Observer - Chain of Responsibility - State - Strategy
Unit-5 - Software Testing Using Pytest 9 Hour
Pytest - Use pytest Using Python - pytest Fixtures - Assertions In pytest - Parametrization In pytest - Decorators In pytest - Run Specific Tests - Example Real world Program

172
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. David M. Beazley, "Python Distilled", Addison-Wesley Professional (2021) 4. Sean Bradley, "Design Patterns in Python: Common GOF (Gang of Four) Design Patterns
2. Allen B. Downey, "Python for Software Design: How to Think Like a Computer Scientist", implemented in Python", (2022)
Learning
Cambrigde University Press (2009) 5. Brian Okken, "Python Testing with pytest-Simple, Rapid, Effective, and Scalable", Second Edition
Resources
3. Alan D. Moore, "Python GUI Programming with Tkinter: Design and build functional and (2022)
user-friendly GUI applications", 2nd Edition (2021) 6. www.python.org

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 30% - 20% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 20% - 30% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mrs. S. Gokularani, L&T Infotech, Chennai 1. Dr.P.Shanthi Bala, CS, Pondicherry University, Puducherry 1. Dr. M Vimaladevi, SRMIST

173
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE393T ANALYSIS OF SOFTWARE ARTIFACTS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: infer software quality metrics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: articulate Software Analysis and vulnerabilities

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: examine software testing and tools

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: attribute Automated test generation

Environment &
Sustainability
CLR-5: deduce Software Maintenance concepts

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: summarize the knowledge of software quality metrics - 2 - 2 - - - - - - - - - - 3
CO-2: determining procedures of software analysis - 2 - 2 2 - - - - - - - - 1 -
CO-3: articulate software testing strategies and tools - 2 - 2 2 - - - - - - - - - 3
CO-4: analyse the approaches to Automated test generation - 3 - 2 - - - - - - - - - 1 -
CO-5: examine software maintenance models - 3 - 2 2 - - - - - - - - - 3

Unit-1 - Software Quality Metrics 9 Hour


Measurement basics, Analyzing the metric data, Metrics for measuring size and structure, Object-oriented metrics, Software Quality models
Unit-2 - Software Analysis 9 Hour
Introduction to Static analysis- Static analyzer for finding dynamic programming errors-data flow testing – a procedure to apply data flow testing- examples performance analysis and verification- Security analysis
and verification – Software vulnerabilities and exploitation
Unit-3 - Software Testing 9 Hour
Software verification testing, Functional testing, Structural testing, State-based testing, Mutation testing, and Software testing tools, Case study with Software Testing
Unit-4 - Automated Test Generation 9 Hour
Approaches to testing data generation, Test data generation using genetic algorithms, and Test data generation tools
Unit-5 - Software Maintenance 9 Hour
Categories of Software Maintenance, Challenges of Software Maintenance, Maintenance of Object-Oriented Software, Case study: Estimation of Maintenance Effort - Belady and Lehman Model, Boehm Model

1. Yogesh Singh& Ruchika Malhotra, Object-Oriented Software Engineering, PHI 4. Tyson R. Browning, “Applying the design structure matrix to system decomposition and integration
Learning Private Limited,2019 problems”, A review and new directions IEEE Transactions on Engineering Management, Vol. 48,
Learning
2. Yogesh Singh, Software Testing, Cambridge University Press,2020 No.3, August 2001.
Resources
3. Kshirasagar Naik and Priyadarshi Tripathy “Software Testing and Quality Assurance: 5. Neeraj sangal and Frank Waldman “Dependency models to manage software Architecture: Journal
theory and practice, edited by copyright John Wiley & sons Inc, 2008. of Defense software engineering, November 2005. Online at www.stsc.hill.af.mil

174
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 30% - 30% -
Level 2 Understand 40% - 30% - 30% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze - - 20% - 20% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mrs.Ruhina Abideen, Assistant Consultant.TCS, 1. Mr.C Ramesh, Associate professor, CVR College of Engineering, 2. Dr.G. Senthil Kumar SRMIST
[email protected] Hyderabad

175
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE396T DESIGN PRINCIPLES OF SMART SPACE MANAGEMENT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand Space fundamentals and IoT Architecture 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: learn different Protocols for IoT Design

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: familiarize the Concepts of smart space design

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: build IoT with Raspberry Pi and Arduino for smart space

Environment &
Sustainability
CLR-5: understand the role of psychology in space making and applying IoT in space design

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: distinguish IoT applications in different domains 3 2 2 - - - - - - - - - 1 - -
CO-2: apply various protocols for design of IoT systems 3 2 2 - - - - - - - - - 1 2 -
CO-3: illustrate the techniques for smart spaces 3 2 2 - - - - - - - - - - - -
CO-4: deploy an IoT application using Raspberry Pi/Arduino 3 2 2 - - - - - - - - - 1 2 3
CO-5: analyze applications of IoT in Real time scenario 3 2 2 - - - - - - - - - 1 2 3

Unit-1 - Introduction to Space Design and IoT 9 Hour


Introduction to spatial design, Characteristics of space design aspects, Spatial Requirements, User & function, Standards & Requirements in spatial Design, Introduction to Internet of Things - Characteristics of IoT,
IoT Network Architecture and Design, Drivers Behind New Network Architectures, Comparing IoT Architectures – The oneM2M IoT Standardized Architecture, The IoT World Forum (IoTWF) Standardized
Architecture, A Simplified IoT Architecture, The Core IOT Functional Stack, IoT Data Management and Compute Stack Hierarchy of Ede, Fog and Cloud, Smart Objects: Things in IOT, Sensors, Actuators, Micro-
Electro- Mechanical Systems (MEMS) and Smart objects, Sensor Networks, Wireless Sensor Networks (WSNs)
Unit-2 - IoT Protocols 9 Hour
Protocol Standardization for IoT, M2M and WSN Protocols, SCADA and RFID Protocols, Unified Data Standards, WPAN Technologies for IoT, Protocols – IEEE 802.15.4, Zigbee Architecture, Wireless HART, Near-
field communication (NFC), Z-Wave, Bluetooth Low Energy (BLE), BACnet, Modbus IP Based Protocols for IoT, Network layer – 6LowPAN, CoAP, Edge connectivity and protocols, Cloud Platforms for IOT
Unit-3 - Smart Space Design 9 Hour
introduction to smart spaces, Need and Significance of smart space, Example projects for smart space, Presentation, Factors considered for smart space design, Need User profile, Factors considered for smart
space design Activity Efficiency required, Application of smart concepts in space Lighting, Application of smart concepts in space Automation Signage, Exercise and Discussion (essential factors and applications)
Unit-4 - IoT Development Boards 9 Hour
IoT Development Boards: Arduino IDE and Board Types, Building IOT with Raspberry Pi, IoT Systems - Logical Design using Python, IoT Physical Devices & Endpoints, IoT Device -Building blocks - Raspberry Pi
–Board-,Linux on Raspberry Pi, Raspberry Pi Interfaces, Programming Raspberry Pi with Python, Other IoT Platforms – Arduino, Interfacing Relay Driver with Arduino Uno, Programming Logic to Control Electrical
Devices via Bluetooth using Arduino, Control Electrical Devices via Bluetooth Communication, Check Electrical Device status over Internet, Implementation of Home Automation using Arduino.
Unit-5 - Psychology and Future Trends 9 Hour
Role of user experience in spatial design, Introduction to Psychology in space making – smart spaces, Impact of Psychology in space making – IQ, Impact of Psychology in space making – EQ, Impact of Psychology
in space making – SQ, Applications in smart spatial Design, Examples for Current research and Future trends in smart spatial design, Case Study: Smart Home Automation, Case Study: Smart Lighting.
176
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. David Hanes, Gonzalo Salgueiro, Rob Barton ,”IoT Fundamentals: Networking 6. Tom Hargreaves, Charlie Wilson, “Smart Homes and their users”, Springer
Technologies, Protocols, and Use Cases for the Internet of Things”, ,Cisco Press, 2017 7. Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds), ―Architecting the Internet of
2. Arshdeep Bahga, Vijay Madisetti, ―Internet of Things – A hands-on approachǁ, Thingsǁ, Springer, 2011.
Universities Press, 2015 8. https://in.pcmag.com/simplisafe-home-security-system/129484/how-to-set-up-your-smart-
Learning 3. Hakima Chaouchi, ― “The Internet of Things Connecting Objects to the Web” ISBN : home-a-beginners-guide
Resources 978-1- 84821-140-7, Wiley Publications 9. https://www.homebuilding.co.uk/advice/how-to-design-a-smart-home
4. Olivier Hersent, David Boswarthick, and Omar Elloumi, ― “The Internet of Things: Key 10. https://www.archdaily.com/936027/psychology-of-space-how-interiors-impact-our-behavior
Applications and Protocols”, WileyPublications 11. https://sushantuniversity.edu.in/blog/do-you-know-how-psychology-of-space-is-impacting-
5. Juan Carlos Augusto, Chris D Nugent, “Designing Smart Homes”, Springer interior-designing/
12. https://www.ylighting.com/blog/smart-home-lighting-guide/

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 30% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ar.Apsaran Raja,Kaalo, NID, Chennai 1. Prof. Premkumar, NIT Trichy 1. Dr.R.Annie Uthra,SRMISTL
2. Dr.M.Ferni Ukrit, SRMIST
3. Mrs.Sri Vallaba, Architecture and Interior Design, SRMIST
4. Dr.A.Alice Nithya, SRMIST

177
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE421T BUSINESS INTELLIGENCE AND ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1 : familiarize with Business Intelligence, Analytics and Decision Support 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2 : understand the technologies for Decision making

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3 : familiarize with predictive modeling techniques

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4 : familiarize with sentiment analysis techniques

Environment &
Sustainability
CLR-5 : understand about Decision making systems

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain knowledge on Business Intelligence, Analytics and Decision Support - - - - - - - - - - - - 1 - -
CO-2: understand the technologies for Decision making - - - - - - - - - - - - - 2 -
CO-3: apply predictive modeling techniques - - - - - - - 3 - 3 - - 2 - -
CO-4: apply sentiment analysis techniques - - - - - - - 3 - 3 - - - - 2
CO-5: gain knowledge on Decision making systems - - - - - - - 3 - 3 - - - 1 1

Unit-1 – Introduction Business Intelligence, Analytics and Decision Support 9 Hour


Information Systems Support for Decision Making - An Early Framework for Computerized Decision Support - The Concept of Decision Support Systems - A Framework for Business Intelligence - Business Analytics
Overview - Brief Introduction to Big Data Analytics - Clickstream Analysis – Metrics - Clickstream Analysis - Practical Solutions - Competitive Intelligence Analysis
T1: Introduction to Power BI and SSMS
T2: Installing Power BI and SSMS
T3: Prepare data in Power BI Desktop
Unit-2 - Decision Making 9 Hour
Decision Making - Introduction and Definitions - Phases of the Decision - Making Process - The Intelligence Phase - Design Phase - Choice Phase - Implementation Phase - Decision Support Systems Capabilities
- Decision Support Systems Classification - Decision Support Systems Components
T4: Load data in Power BI Desktop
T5: Model data in Power BI Desktop part-1
T6: Model data in Power BI Desktop part-2
Unit-3 - Predictive Modeling and Sentiment Analysis 9 Hour
Basic Concepts of Neural Networks - Developing Neural Network - -Based Systems - Illuminating the Black Box of ANN with Sensitivity - Support Vector Machines - A Process Based Approach to the Use of SVM
- Nearest Neighbor Method for Prediction -Sentiment Analysis Overview - Sentiment Analysis Applications - Sentiment Analysis Process - Sentiment Analysis - Speech Analytics
T7: Implement data model using SQL in Power BI
T8: Create DAX calculations in Power BI Desktop part-1
T9: Create DAX calculations in Power BI Desktop part-2
178
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Multi-criteria Decision Making Systems 9 Hour
Decision Support Systems modeling - Structure of mathematical models for decision support - Decision making under certainty - Uncertainty and Risk - Decision modeling with spreadsheets - Mathematical
programming optimization - Decision analysis introduction - Decision tables - Decision Trees - Multi-criteria decision making - Pairwise comparisons
T10: Design a report in Power BI Desktop part-1
T11: Design a report in Power BI Desktop part-2
T12: Create a Power BI dashboard
Unit-5 - Automated Decision Systems 9 Hour
Automated Decision Systems - The Artificial Intelligence field - Basic concepts of Expert Systems - Applications of Expert Systems - Structure of Expert Systems - Knowledge Engineering - Development of Expert
Systems - Location based Analytics - Cloud Computing - Business Intelligence
T13: Create a Power BI paginated report
T14: Perform data analysis in Power BI Desktop
T15: Enforce Row-level security

1. Ramesh Sharda, Dursun Delen, EfraimTurban, J.E.Aronson,Ting-Peng Liang, David 3. Alberto Ferrari Marco Russo, “Definitive Guide to DAX, The: Business intelligence for Microsoft
King, “Business Intelligence and Analytics: System for Decision Support”, 10 th Edition, Power BI, SQL Server Analysis Services, and Excel”, Second Edition, By Pearson, 2020
Learning
Pearson Global Edition, 2013.
Resources
2. Brett Powell, “Mastering Microsoft Power Bi: Expert techniques for effective data
analytics and business intelligence”, 2018

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.V.Selvakumar,Hexaware Technologies, [email protected] 1. Dr. T. Veerakumar, Professor, NIT Goa 1. Dr. T. Karthick, DSBS, SRMIST

179
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE493T SOFTWARE SECURITY E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: comprehend the need for Software Security and the threats to software security 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: realize Secure software architecture design and coding

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gain basic knowledge on web security principles

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: acquire risk management and mitigation of risk in software development

Environment &
Sustainability
CLR-5: learn testing types and strategies for secure software

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify security threats and issues in software - - - 3 - - - - - - - - - 1 3
CO-2: prepare software by incorporating security principles - 2 3 - - - - - - - - - - - 3
CO-3: predict the issues in web and database security - - 2 3 - - - - - - - - - 1 -
CO-4: apply risk management strategies and risk mitigation strategies in software development - - 2 - - - - - - - - - - 1 3
CO-5: use testing strategies for secure software development - 3 - - - - - - - - - - - - 3

Unit-1 - Introduction 9 Hour


Introduction to software Security- Software assurance and software security - Threats to Software security - Sources of Software Insecurity - Benefits of detecting software security defects early - Managing Secure
software development - Risk Management framework for Software security - Software security practices in the development lifecycle - Properties of secure software - Influencing security properties of software -
Building a security assurance case - Incorporating assurance cases into SDLC -Security Requirements Engineering
Unit-2 - Secure Software Architecture and Design 9 Hour
Software security practices for architecture and design - Software security knowledge for architecture and design - Software characterization - Threat analysis - Architectural vulnerability assessment - Risk
likelihood determination - Risk Impact Determination - Risk Mitigation Planning - Security principles - Security guidelines and attack patterns - Secure coding and testing - Code analysis - common software code
vulnerabilities - Source code review - Coding practices - Best practices for secure coding
Unit-3 - Client and Server-Side Security 9 Hour
Browser Security Principles - Defining the same-origin policy - Client-side vs. server-side - Exceptions to the same origin policy- Cross-site scripting- XSS defense- Cross-site request forgery - CSRF defense -
Prevent XSS -SQL Injection - SQL Injection effects - Blind SQL Injection - Setting Database Permissions - Stored Procedure Security - SQL Injection in stored procedures, Case study: Application with Client-side
Security, Application with server side security.
Unit-4 - Risk Management 9 Hour
Risk Management framework - Five stages of activity- Applying the RMF- Understanding the business context - Gathering the artifacts, conducting project research, Identifying the business and technical risk,
Developing risk questionnaires, interviewing the target project team, Analyzing the research and interview data - Uncovering technical risks - Analyzing software artifacts - Synthesizing and ranking the risk -
Reviewing the risk data - Conducting the business and technical peer review - Defining the risk mitigation strategy - Risk Management is a framework for Software security

180
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Software Security Testing 9 Hour
About Software Security testing - Contrasting software testing and software security testing - Functional testing - Risk-based testing - Penetration Testing - Security testing consideration throughout the SDLC - Unit
testing - Testing Libraries - Testing Executable files- Integration testing - System Testing - Security Failures - Categories of Errors - Attacker Behaviour - Functional and attacker perspectives for
Security Analysis -Identity Management and Software development, Case study on Software security Testing.

1. Gary McGraw, ”Software Security–A guide for Project Managers”, Addison-Wesley , 3. JamesM.Helfrich, ”Security for Software Engineers”, CRC Press, Taylor and Francis Group, 2019
Learning Professional,2008,ISBN-13:978-0321509178 4. James Ransome, Anmo lMisra,” Core Software Security”, CRC Press, Taylor, and Francis Group,
Resources 2. Andrew Homan, “” Web Application Security Exploitation and Countermeasures for 2014.
Modern Web Applications”, O’Reilly Media, Inc, First edition,2020

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 30% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Joseph Thankarajan, TCS Chennai 1. Dr. John T.Mesiah Dhas, Associate Professor, T.John Institute of 1. Dr.T.S.Shiny Angel, SRMIST
Technology, Bangalore

181
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE495T ARTIFICIAL INTELLIGENCE IN AGILE SYSTEMS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce a broad understanding of basic concepts of Artificial Intelligence and Agile systems 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate the Software design patterns for implementing Agile systems in real world applications

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: demonstrate the Various Agile AI process and outcomes

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: analyze the Various Agile design principles in various applications

Environment &
Sustainability
CLR-5: discuss the Knowledge in Applications of Artificial intelligence and Agile systems in Industry

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: familiarize the concepts of Artificial Intelligence inn Agile systems and planning methods 3 3 - - - - - - - - - - 1 2- 2
CO-2: understand the various software design patterns for appropriate scenarios 3 2 - - - - - - - - - - - 2 2
CO-3: acquire the knowledge in Agile AI process and outcomes 3 2 2 - - - - - - - - - 1 - 3
CO-4: gain knowledge on various agile design principles in real world industry 3 2 2 - - - - - - - - - - - 3
CO-5: categorize the applications of Artificial Intelligence in Agile systems in designing applications 3 2 2 - - - - - - - - - - 2 -

Unit-1 - Introduction to AI and Agile Techniques 9 Hour


Intelligent Agents, Problem Solving with AI, Intelligent Agents, Structure of Agents, Agile Alliance, Principles of Agile Practices, Practices of Extreme Programming, Planning –Initial Exploration, Release Planning,
Iteration planning , Task planning, Challenges in Traditional Systems, Real time applications of AI in Agile systems, Test driven development, Acceptance Test, Serendipitious Architecture, Serendipitious decoupling
Unit-2 – Design Patterns and Applications 9 Hour
Symptoms of poor design, Principles of a good design, Types of design patterns, Strategy design Pattern, Real time Applications of Strategy design Pattern, Mediator design pattern, Real time Applications of
Mediator design pattern, Singleton design pattern, Real time Applications of Singleton design pattern, Factory design pattern, Real time Applications ofFactory design pattern
Façade design Pattern
Unit-3 – Agile AI Process 9 Hour
Agile Approach, AI process for business today, Agile design Example, Agile approach in AI, Organizing Agile for AI Data Scientist, Organizing Agile for AIData Engineers, Organizing Agile for AIBusiness Analysts,
Need for Agile in AI, Contrasting Machine Learning and AI, Advantages of Agile AI, Agile Framework for AI Projects, Case study: Identify which pattern is applicable for the given case study and justify, Case Study
: Prediction of disease patterns and proactive care
Unit-4 – Agile Design Principles 9 Hour
Liskov Substitution Principle, Example of a violation of LSP, Real Example of Liskov Substitution Principle, Factoring Instead of Deriving, Heuristics and Concentions Dependency inversion principle, Layering,
Dynamic Vs static polymorphism, Interface Segregation principle, Backward force applied by clients on Interfaces, Class interfaces vs Object Interfaces, Case study: Identify which pattern is applicable for the given
case study and justify, Case Study : Credit card and loans fraud patterns and utilization

182
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 – Agile in Healthcare 9 Hour
Learning from Real-Time, Big Data Applications of AI in health care, Realizing the Potential of AI in Healthcare, Evolution of Data and Its Analytics, Real time Challenges of Big Data, Impact of Data in Future, Ethics
of Artificial Intelligence and Machine Learning, Prediction Ethics, Preventing Algorithms from Becoming Immoral, Real time applications of Agile systems, AI and Agile systems in health care, Future of Health care,
Industrial Impact of Artificial Intelligence in health care, Industrial Impact of Artificial Intelligence in Agile System, Case Study : Designing a Document Editor : Design Problems, Document Structure, Case Study :
Customer experience: Chat bot to substitute patient/member engagement

1. Stuart J. Russell, Peter Norwig , Artificial Intelligence –A Modern approach, 3rd 4. Robert C. Martin, Agile Software Development, Principles, Patterns, and Practices, Pearson
PearsonEducation, 2016 Education, 2002
Learning
2. Arjun Panesar, Machine Learning andAI for HealthcareBig Data for Improved 5. Bernhard Rumpe , Agile Modeling with UML Code Generation, Testing, Refactoring, Springer 2017
Resources
HealthOutcomes, Apress ,2019 6. Andrew Stellman& Jennifer Greene, Head First Agile, A Brain-Friendly guide, Oreilly ,2017
3. Carlo Appugliese, Paco Nathan, William Roberts, Agile AI, O’Reilly Media, Inc.2020

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 30% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.S..Ravikumar , Director , Agile Practise, TEK System, Chennai 1. Dr T R Saravanan , SRMIST
2. Dr.G.Maragatham , SRMIST

183
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE496T DEEP LEARNING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the mathematical building blocks of Deep learning 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: get familiar with tuning of Deep Neural Network and layered approach

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand different architectures of Deep Networks

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: design and implement CNN for computer vision application using TensorFlow/ Keras

Environment &
Sustainability
CLR-5: design and implement RNN for text and sequence processing application using TensorFlow/ Keras

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the mathematical building blocks of Neural networks 3 1 - - - - - - - - - - 1 - -
CO-2: learn the foundations of Neural network and training them 3 1 3 - - - - - - - - - - 2 -
CO-3: understand Architectural principles of neural network and major architectures of Deep Networks 2 2 3 - 3 - - - - - - - - 2 -
CO-4: implement CNN model for computer vision application using TensorFlow/ Keras 2 2 3 - 3 - - - - - - - - 3 2
CO-5: implement RNN model for text and sequence processing application using TensorFlow/ Keras 2 2 3 - 3 - - - - - - - - 3 2

Unit-1 - Introduction to Deep Learning 9 Hour


Artificial intelligence - Machine learning - Learning representations from data - Understanding how deep learning works - mathematical building blocks of neural networks - Data representations for neural networks
- Scalars - Vectors - Matrices - 3D tensors and higher-dimensional tensors - Key attributes - Vector data - The gears of neural networks: tensor operations - Element-wise operations - Tensor dot
Unit-2 - Foundations of Neural Network and Deep Learning 9 Hour
Neural Networks – The Biological Neuron – The Perceptron – Multilayer feed forward networks – Training neural networks – Backpropagation Learning – Activation functions – Linear – Sigmoid – Tanh -SoftMax –
Loss Functions - - Hyperparameters – Learning rate – Regularization – Momentum - Sparsity
Unit-3 - Fundamentals of Deep Networks 9 Hour
Architectural principles of Deep Networks – Parameters – Layers – Activation functions – Loss functions – Optimization algorithms – Hyperparameters – Building blocks of Deep Networks – RBMs – Autoencoders
– Variational Autoencoders – Major architectures of Deep Networks – Deep belief Networks – Generative Adversarial Networks – Convolution Neural Networks – Recursive Neural Networks
Unit-4 - Deep Learning for Computer Vision 9 Hour
Introduction to convnets -The convolution operation - The max-pooling operation-Training a convnet from scratch on a small dataset -The relevance of deep learning for small-data problems - Downloading the data
– Building your network - Data preprocessing - Using data augmentation - Using a pre trained convnet - Feature extraction - Fine Tuning - Visualizing what convnets learn - Visualizing intermediate activations -
Visualizing convnet filters - Visualizing heatmaps of class activation
Unit-5 - Deep Learning for Text and Sequences 9 Hour
Working with text data - One-hot encoding of words and characters - Using word embeddings - Putting it all together: from raw text to word embeddings - Understanding recurrent neural networks - A recurrent layer
in Keras - Understanding the LSTM and GRU layers - A concrete LSTM example in Keras - Advanced use of recurrent neural networks - A temperature-forecasting problem - Preparing the data - first recurrent
baseline - Using recurrent dropout contents to fight overfitting - Stacking recurrent layers - Using bidirectional RNNs - Sequence processing with convnets - Understanding 1D convolution for sequence data -1D
pooling for sequence data - Implementing a 1D convnet – Combining CNNs and RNNs to process long sequences
184
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Case Studies:
1. Develop a framework to classify facial expression using Convolutional Neural Network. Consider six basic emotional categories of anger, disgust, fear, happiness, sadness, and surprise and classify them
without any complex pre-processes
2. NLP models can be used for text classification in order to detect spam-related words, sentences, and sentiment in emails, text messages, and social media messaging applications. Implement an NLP system
to classify spam messages

1. Deep Learning A Practitioner’s Approach, Josh Patterson & Adam Gibson, published by O’Reilly 4. Deep Learning for Beginners: A Beginner's Guide to Getting Up and Running with Deep
Media, Inc, First Edition,2017 Learning from Scratch Using Python. Dr. Pablo Rivas and Laura Montoya, published by
Learning
2. Deep Learning with Python, FRANÇOIS CHOLLET, published by Manning Publications Co, 2018 Packt publishing, 2020
Resources
3. Better Deep Learning Train Faster, Reduce Overfitting and Make Better Predictions, Jason
Brownlee, Machine Learning Mastery, 2019.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 30% - 20% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 30% - 30% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.A.Vasanthi, Senior Consultant, Slalom · Sydney, New South Wales, Australia 1. Dr.A.Punitha, Associate Professor, Annamalai University 1. Dr.A.Revathi, SRMIST

185
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE497T GAMING AND VIRTUAL REALITY E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the fundamentals of Virtual Reality 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the basics of perception and human vision

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: introduce the concepts of motion and tracking in VR tools

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the basic concepts of game design

Environment &
Sustainability
CLR-5: develop a game using Unity

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: summarize the concepts of Geometry of Virtual Reality 3 - - - 2 - - - - - - 1 - - -
CO-2: explain the basics of visual perception and rendering 3 - 2 - 2 - - - - - - 1 - 2 -
CO-3: apply the concepts of motion and tracking in VR 3 - 3 - 2 - - - - - - 1 - 2 2
CO-4: learn the concepts of game designing 3 - 2 - 2 - - - - - - 1 - 2 -
CO-5: apply the concepts of game designing to develop a game using Unity 3 - 3 - 2 - - - - - - 1 - 3 2

Unit-1 - Introduction to Virtual Reality 9 Hour


Defining Virtual Reality, History of VR, Scientific landmarks Computer Graphics, Basics of Geometric Models, Degree of freedom, Changing the position and Orientation, Introduction to Axis-Angle Representations
of Rotation-, Basics of Transformations-Representation of the Virtual World, Virtual environments, Visual Displays, Auditory Displays, Haptic Displays.
Unit-2 - Visual Perception and Rendering 9 Hour
Human Physiology and Perception, Human Eye, eye movements, Perception of Depth, Perception of Motion, Perception of Color, World Environment, VR Environment, Key Elements of Virtual Reality Experience,
Interface to the Virtual World-Input & output, Combining Sources of Information Visual Rendering-Ray Tracing and Shading Models, Rasterization, Correcting Optical Distortions, Improving Latency and Frame Rates
Unit-3 - VR Tools, Motion and Tracking 9 Hour
R database, VR toolkits, Software for VR, Tessellated Data, Lights and Camera, Scripts, Graphical User Interface, Motion in Real and Virtual Worlds- Velocities and Accelerations, The Vestibular System, Physics
in the Virtual World Mismatched Motion and Vector Tracking- Tracking 2D & 3D Orientation, Tracking Position and Orientation, Tracking Attached Bodies
Unit-4 - Introduction to Game Design 9 Hour
Game Design and Paper Prototyping - Game Analysis Frameworks - Inscribed Layer, Dynamic Layer - Cultural Layer, Design Goals - Paper Prototyping, Puzzle Design - The Digital Game Industry, Digital Prototyping
- Introducing Development Environment: Unity - Thinking in Digital Systems - Introducing C# - Variables and Components - Boolean Operations and Conditionals - Functions and Parameters
Unit-5 - Basics of Game Development 9 Hour
Basics of Game Development - Scenes, Game Objects, Components - Working with Unity 2D & 3D - 2D graphics, Camera - Sprites a Texture Atlases – Animation – Scrolling - Overview of vector math - Physics
principles - 3D math primer Basics of 3D World, 3D rendering Essentials - Using Unity for 3D development

186
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Virtual Reality, Steven M. LaValle, Cambridge University Press, 2016 5. Jonathon Manning, Paris Buttfield-Addison, "Mobile Game Development with Unity: Build
2. Virtual and Augmented Reality: An Educational Handbook, Zeynep Tacgin , Cambridge Once, Deploy Anywhere", O'Reilly Media Inc., 2017
Learning Scholars Publishing, 2020 6. Steve Aukstakalnis , “Practical Augmented Reality: A Guide to the Technologies,
Resources 3. Jeremy Gibson, "Introduction to Game Design, Prototyping, and Development: From Concept Applications, and Human Factors for AR and VR” 2016, Publisher(s): Addison-Wesley
to Playable Game with Unity and C#" ISBN-10:0321933168. 2014 Professional
4. Sanjay Madhav, "Game Programming Algorithms and techniques", Addidon-Wesley, 2013 7. https://nptel.ac.in/courses/106/106/106106138/

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 30% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Tejas Gowda, Co-Founder & Chief Data Scientist, 1. Dr. T. Senthilkumar, Associate Professor, Amrita School of 1. Dr. A. Alice Nithya, SRMIST
TenzAI Engineering, Amrita Vishwa Vidyapeetham

187
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE498T SMARTPHONE COMPUTING AND ITS APPLICATIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
introduce the basic terminologies of mobile computing, fundamental concepts of mobile programming Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
environment
CLR-2: understand about smartphone energy management, localization techniques, location privacy issues

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: expertise to Mobile Social Networking

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn about context-awareness and gesture recognition methodologies

Environment &
Sustainability
CLR-5: exposure to Advanced Mobile Applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand Networking basics and Different MPE 3 - - - - - - - - - - - - 2 -
CO-2: gain Knowledge of Wireless energy and localization 3 - - - - - - - - - - - - 2 -
CO-3: introduce State of Art research in mobile computing technologies 3 - - 2 3 - - - - - - - - 1 2
CO-4: gain knowledge in recognition methodologies 3 - - - 3 - 2 - - - - - - 1 -
CO-5: understand Advanced Mobile Applications 3 - - 2 3 - 1 - - - - - - 1 2

Unit-1 - Networking Basics 9 Hour


Wireless LAN, Bluetooth, WIFI Direct, NFC Programming platforms: Overview of different mobile programming environments, Difference with the classical programming practices, Introduction to mobile operating
systems, iOS, Android, Windows, Mobile application development. Introduction to IoT: Definition, trend, IoT components, Data cleaning and processing, Social-IoT
Unit-2 - Wireless Energy Management 9 Hour
Measurement of energy consumption, WiFi Power Save Mode (PSM), Constant Awake Mode (CAM), Different Sleep States, WiFi Energy management Localization: User location and tracking system, Cell tower
localization, Spot localization, Logical location, Ambience fingerprinting, War-driving, Localization without war-driving, Indoor localization, Crowdsourcing for localization. Context Sensing: Context-Aware system,
Automatic Image Tagging, Safety critical applications Energy-efficient Context Sensing, Contextual Ads and Mobile Apps.
Unit-3 - Mobility 9 Hour
Overview of Mobility models, Automatic Transit Tracking, Mapping, Arrival Time Prediction, Augmenting Mobile 3G with WiFi, Vehicular WiFi Hotspots, Code Offload Privacy and Security: Authentication on Mobile
Phones, Activity based Password, Finger Taps usage as Fingerprints, Location Privacy
Unit-4 - Mobile Affective Computing 9 Hour
Human Activity and Emotion Sensing, Health Apps Activity and Gesture Recognition: Machine Recognition of Human Activities, Mobile Phones to Write in Air, Crowdsensing based activity recognition, Personalized
Gesture Recognition, Content Rating, Recognizing Human without Face Recognition, Phone-to-Phone Action Games, Interface design issues, Touchscreen, Gesture-based Input.
Unit-5 - Case Studies 9 Hour
Smartphone App game, Determining driver phone use, Smart phone Configuration I Tourism, Network Monitoring using smart phone.

188
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Smart Phone and Next Generation Mobile Computing” Morgan Kaufmann Series in 3. https://ieeexplore.ieee.org/search/searchresult.jsp?newsearch=true&queryText=determining%20driver%
Learning Networking, PeiZheng, Lionel Ni 1st Edition ELSEVIER 2005 20phone%20use
Resources 2. .”\Principles Of Mobile Computing”, Hansmann, LotharMerk, Martin Niclous, 4. Https://link.springer.com/book/10.1007/b102605
Stober, reamtech Press 2006 2nd Edition 5. https://ieeexplore.ieee.org/document/7152220.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 30% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.R.Jaya, Data Scientist, Great Learning, Bangalore. 1. Dr.R. Senthilkumar, Associate professor, Dept of CSE, New Horizon 1. Dr.Dinesh G, SRMIST
college of Engineering, Bangalore.
2. Dr.N. Thillai Arasu, Associate Professor, School of CSE &IT, Reva
University, Bangalore

189
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

UNDERGRADUATE/ INTEGRATED POST


GRADUATE DEGREE PROGRAMMES
(With exit option of Diploma)

(Choice Based Flexible Credit System)

Regulations 2021

Volume – 11D
(Syllabi for Computer Science and Engineering w/s in
Cloud Computing Programme Courses)

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

190
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Core Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

191
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC314P BIG DATA ESSENTIALS C PROFESSIONAL CORE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: identify the basics of big data and hadoop 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: demonstrate the tools and techniques in big data

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: inspect the query language based on big data application

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: interpret classification and clustering in big data application

Environment &
Sustainability
CLR-5: experiment the Big data Visualization tools

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire knowledge on the basics of big data 2 - - 3 - - - - - - - - - - 2
CO-2: examine the tools and techniques using Hadoop, HDFS, and Map Reduce - - - 3 3 - - - - - - - - - 3
CO-3: build any database for the application in big data 2 - - 3 - - - - - - - - - - 3
CO-4: apply different classification and clustering algorithms using data sets in an application - - - 3 - - - - - - - - - - 3
CO-5: analyze the Visualization techniques in big data 2 - - 3 3 - - - - - - - - - 3

Unit-1 - Introduction 9 Hour


Introduction to Big Data, Impact of Big Data, Parallel Processing, and Data Parallelism, Tools of Big Data, Introduction to the Hadoop Ecosystem, Introduction to MapReduce, The Hadoop Ecosystem/Common
components: Introducing HDFS, Hive, HBase, and Spark, other modules, Installing Hadoop
Unit-2 – Hadoop Distributed File System 9 Hour
Features of HDFS, HDFS Commands, Retrieving file data from HDFS using Python Snakebite, Deleting files in HDFS using Python Snakebite, Map Reduce and Spark RDD Big Data, Working with HDFS, Working
with HBase, Difference between HDFS and HBase, Hadoop Word Count using Map Reduce, Matrix Multiplication using Map Reduce
Unit-3 – Pig Programming 9 Hour
Introduction to Pig, Parallel processing using Pig, Pig Latin-Input and output, Hive: Introduction, data types and file formats, QL-data definition, data manipulation, QL views, indexes, Hive queries with partitioning.
Unit-4 - Spark Framework 9 Hour
GPU Computing, CUDA Programming model, Multiplication in CUDA, CUDA Memory model, Shared memory matrix multiplication Writing Spark application, Spark programming in R, Scala, Python, Java, Streaming
application, Classification and Clustering in Big data, K-Means clustering, Decision Tree Classification, Naive Bayes Classification.
Unit-5 – Big Data Visualization 9 Hour
Introduction to big data visualization, Tree Maps, Maps, Gauge, Sunburst, Different visualization tools, Creating Visualization in Tableau, Different visualization methods in Tableau

1. Sima Acharya, Subhashini Chellappan,” BIG Data and Analytics” Wiley Publication, 2020. 4. Kyle Banker, PiterBakkum, Shaun Verch,” MongoDB in Action” Dream tech Press
Learning 2. Michael Minelli, Michele Chambers, AmbigaDhiraj, “BigData, BigAnalytics - Emerging Business publication 2016.
Resources Intelligence and Analytic Trends for Today's Businesses”, Wiley Publication, 2018. 5. Achari, Shiva “Hadoop Essentials” Birmingham, UK: Packt Publishing. 2015.
3. Thomas Erl, “Big Data Fundamentals-Concepts,Drivers and Techniques”,Pearson publication, 2016 6. Tom White, “HADOOP: The Definitive Guide”, O Reilly 2012
192
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Formative Project Based Learning Report and Viva Voce Final Examination
Bloom’s
CLA-1 Average of unit test CLA-2 (20%) (0% weightage)
Level of Thinking
(20%) (60%)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% - 15% - -
Level 2 Understand 25% - - 20% - 20% - -
Level 3 Apply 30% - - 25% - 25% - -
Level 4 Analyze 30% - - 25% - 25% - -
Level 5 Evaluate - - - 10% - 10% - -
Level 6 Create - - - 5% - 5% - -
Total 100 % 100% 100% -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Kumanan P, Project Manager, 1. Dr.V.Vijayarajan, Associate Professor/HOD, 1. Mrs.V.Vijayalakshmi, SRMIST
CTS, Chennai Vellore Institute of Technology, Vellore

193
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC316J CLOUD ARCHITECTURE AND PROTOCOLS C PROFESSIONAL CORE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: explore cloud computing models and infrastructure for various networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
identify policies, mechanisms and scheduling for resource management, virtualization, and optimization

The engineer and society


CLR-2:

Conduct investigations of

Individual & Team Work


Engineering Knowledge
of networks

Design/development of

Project Mgt. & Finance


CLR-3: compare multiple approaches to cloud system design and solve real world problems

Modern Tool Usage

Life Long Learning


complex problems
Problem Analysis

Communication
CLR-4: illustrate storage concept and self-organizing capability for different cloud systems

Environment &
Sustainability
CLR-5: relate Cloud architecture into business models

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: explore the concepts of cloud infrastructure, for different cloud models 3 2 - - - - - - - - - - 2 - -
CO-2: monitor the scalability issues and its performance in a distributed environment 3 2 - - 3 - - - - - - - 3 - 3
CO-3: apply the principle of virtualization, storage, and data management for resource utilization 3 - - - 3 - - - - - - - - - 3
CO-4: create application by utilizing cloud platforms 3 - - - - - - - - - - - - - 3
CO-5: relate Cloud architecture with maximization of service delivery 3 2 - - - - - - - - - - 2 - -

Unit-1 - Introduction 12 Hour


Vision of Cloud Computing, defining a Cloud, Cloud Computing Reference Model, Characteristics and Benefits, Historical Developments, Building Cloud Computing Environments, Computing Platforms and
Technologies, Eras of Computing, Parallel vs. Distributed Computing, Elements of Parallel Computing
Unit-2 – Virtualization Techniques 12Hour
Virtualization and Cloud Architecture, Characteristics of Virtualized Environments, Taxonomy of Virtualization Techniques, Virtualization and Cloud Computing, Pros and Cons of Virtualization, Technology Examples,
Xen, VMware, Microsoft Hyper-V, Cloud Reference Model and Architecture, Infrastructure as a Service, Platform as a Service, Software as a Service, Types of Clouds, Economics of the Cloud, Open Challenges
in Clouds, Aneka Architecture, Building Private Clouds using Aneka, Cloud Management
Unit-3 – Application Programming 12 Hour
Cloud Application Programming, Concurrent Computing and Thread Programming, Multithreading with Aneka, Programming Applications with Aneka Threads; High-Throughput Computing and Task Programming,
Task-based Application Models, Aneka Task-Based Programming, Task Programming Model, and Developing Applications with the Task Model; Data Intensive Computing: Map-Reduce Programming
Unit-4 - Applications 12 Hour
Public Cloud Infrastructures and Applications, Amazon Web Services - Compute, Storage, and Communication Services; Google AppEngine – Architecture, Application Life-Cycle, Cost Model; and Microsoft Azure.
Scientific Applications - ECG Data Analysis on Cloud, Protein Structure Prediction, Satellite Image Processing; Business and Consumer Applications – CRM, Social Networks, Media Applications, and Multiplayer
Online Gaming.

194
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 – Energy Aware Techniques 12 Hour
Advanced Topics in Cloud Computing, Energy efficiency in clouds, Energy-efficient and green cloud computing architecture, Market-based management of clouds, Market-oriented cloud computing, A reference
model for MOCC,3 Technologies and initiatives supporting MOCC, Observations, Federated clouds/Inter Cloud, Characterization and definition, Cloud federation stack, Technologies for cloud federations, Third-
party cloud services such as Meta CDN.
Lab Experiments
1. Installation of Cloud Simulation 8. EC2 Instance Window virtual machine launch and access using RDP Client from any network/specified
2. Create a datacenter with one host and run one cloudlet on it. network using private keypair
3. Create a datacenter with one host and run two cloudlets on it. The cloudlets run in VMs with the 9. AWS Platform: Dashboard Services Study Experiments
same MIPS requirements. The cloudlets will take the same time to complete the execution. 10. EC2 Instance Linux virtual machine launch and access using putty application/SSH Client from any
4. Create a datacenter with two hosts and run two cloudlets on it. The cloudlets run in VMswith network/specified network by private keypair
different MIPS requirements. The cloudlets will take different time to complete the execution 11. Configure Virtual Private Cloud with single public subnet and launch any virtual machine within the subnet.
depending on the requested VM performance. 12. Configure public Virtual Private Cloud with one public subnet and one private subnet then launch &
5. Create two datacenters with one host each and run two cloudlets on them. access any virtual machine within the private subnet
6. Create two datacenters with one host each and run cloudlets of two users on them. 13. Create a Lambda function with the console in AWS Platform
7. Create scalable simulations 14. Creating a server less application with continuous delivery in the Lambda console
Create Application Load Balancer Using AWS Lambda function

1. Rajkumar Buyya, Christian Vecchiola, and ThamaraiSelvi, Mastering Cloud Computing, McGraw 4. John W Rittinghouse, James F Ransome: Cloud Computing Implementation,
Hill, New Delhi, India, 2013, ISBN-13: 978-1-25-902995-0. Management and Security, CRC Press, 1st Edition, 2013, ISBN: 978-1-4398-0680-7.
Learning 2. Dan C Marinescu: Cloud Computing Theory and Practice. Elsevier (MK), 1st edition, 2013, ISBN: 5. Gautam Shroff, “Enterprise Cloud Computing Technology Architecture Applications”,
Resources 9780124046276. Cambridge University Press; 1 edition, [ISBN: 978-0521137355], 2010.
3. Kai Hwang, GeofferyC.Fox, Jack J Dongarra: Distributed Computing and Cloud Computing, from
parallel processing to internet of things. Elsevier (MK), 1st edition, 2012, ISBN: 978-0-12-385880-1

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 20% - - 20% 20% -
Level 3 Apply 20% - - 20% 20% -
Level 4 Analyze 15% - - 15% 15% -
Level 5 Evaluate 15% - - 15% 15% -
Level 6 Create 15% - - 15% 15% -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Sudhakar E P Development Project Leader at American 1. Dr. Rajkumar Buyya University of Melbourne, Australia 1. Dr.M.Saravanan, SRMIST,
Megatrends International India (P) Ltd

195
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Elective Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

196
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE261T FUNDAMENTALS OF CLOUD COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
review the fundamental ideas behind Cloud Computing, the evolution of the paradigm, its applicability; Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
benefits, as well as current and future challenges
CLR-2: discover cloud-enabling technologies and get exposure to advanced clouds

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: employ distributed file system and cloud storage technologies

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: identify the cloud security threats and protective mechanisms for cloud computing

Environment &
Sustainability
CLR-5: compare various architectural styles and cloud development models

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: describe the fundamentals of cloud computing and its applications, benefits, and Challenges 3 - - 2 - - - - - - - - 3 - -
CO-2: illustrate concepts in cloud infrastructures to understand the cloud system - - - - - - - - - - - - 3 - -
CO-3: demonstrate the usage in storage system in cloud 3 - - 3 - - - - - - - - 3 - -
CO-4: investigate security issues related to cloud computing - 2 - 2 - - - - - - - - 3 - -
CO-5: categorize cloud programming models and apply to solve problems on the cloud 3 - - 2 2 - - - - - - - - - 3

Unit-1 - Introduction to Cloud Computing 9 Hour


Network-Centric Computing - Origin of Cloud Computing-Evolution of cloud computing - Basic Concepts and Terminology - Goals and Benefits - Risks and Challenges -Roles and Boundaries - Cloud Characteristics
- Cloud Deployment Models - Cloud Service Models - Cloud Service Providers and the Cloud Ecosystem -SLA Management in Cloud Computing: A Service Providers Perspective – Overview of Amazon Web
Services (AWS)– Tutorial: Creating an account on AWS
Unit-2 - Cloud Enabling Technologies 9 Hour
Broadband networks and Internet architecture - Data Center Technology - Web Technology - Multitenant Technology - Service Technology -Virtualization Technology - Virtual Machines - Hypervisors -Full
Virtualization and Para-virtualization - Hardware Support for Virtualization - Kernel-Based Virtual Machine– Tutorial: Creating AWS EC2 Instances.
Unit-3 - Introduction to Cloud Data Storage 9 Hour
The evaluation of storage technology - Storage Models - File Systems and databases - Cloud Object Storage (Amazon S3) - Data Storage for Online Transaction Processing Systems- Disk Locality versus Data
Locality in Computer Clouds- Tutorial: Creating a S3 bucket in AWS
Unit-4 - Fundamental Cloud Security 9 Hour
Basic Terms and Concepts - Threat Agents, Cloud Security Threats - Cloud Security Mechanisms - Encryption – Hashing - Digital Signature - Public Key Infrastructure - Identity and Access Management - Single
Sign-On: Kerberos authentication - One-time password, Basic cloud data - security mechanisms - Virtual Machine Security - Security of Virtualization - A Trusted Hypervisor - Mobile Devices and Cloud Security -
Tutorial: Creating an IAM in AWS
Unit-5 - Cloud Application Development and Architectural Styles 9 Hour
MapReduce Programming Model - Case Study: The Grep – TheWeb Application - Hadoop: Yarn and Tez - SQL on Hadoop: Pig, Hive, and Impala - Current Cloud Applications and New Opportunities - Design
approaches with Case Study - Design methodology for IaaS Service Model - Google API, More on AWS EC2 Instances.

197
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Dan C. Marinescu,“Cloud Computing Theory and Practice”, Second Edition Copyright © 2018 3. Rajkumar Buyya, James Broberg, AndrzejGoscinski, Cloud Computing Principles and
Elsevier Inc. All.https://www.sciencedirect.com/book/9780128128107/cloud-computing Paradigms, Wiley Publications, 2017
Learning 2. Thomas Erl, ZaighamMahmood, and RichardoPuttini, "Cloud Computing: Concepts, 4. ArshdeepBahga, Vijay Madisetti, "Cloud Computing: A Hands-On Approach", University
Resources Technology & Architecture", Prentice Hall/PearsonPTR, Fourth Printing, 2014, ISBN: Press, 2016, ISBN13: 978-0996025508.
978013338752. 5. K. Chandrasekaran, "Essentials of Cloud Computing", Chapman and Hall/CRC Press,
2014, ISBN 9781482205435

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 30% - 30% - 30% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 10% - 10% - 10% -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Mohit Kumar, Senoir Data Scientist, 1. Dr. K.R. Jothi Associate Professorship of Computational Intelligence, School of Computer Science 1. Ms.V.Lavanya, SRMIST
Verizon,Bangalore,Karnataka,India and Engineering, Department of Information Technology, Vellore Institute of Technology, Vellore

198
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE262T COMMUNICATION SYSTEMS ENGINEERING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: illustrate the principles of Communication systems engineering 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: discuss the Knowledge on Communication systems components

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: apply encoding and decoding techniques

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: sketch the fundamentals of Fibre Optic Communication

Environment &
Sustainability
CLR-5: outline the basics of Satellite Communication

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: outline the basic ideas about Communication and its types 3 - - - - - - - - - - - 3 - -
CO-2: identify the applications of Communication systems, information sources and source coding algorithms 3 - - - - - - - - - - - 3 - -
CO-3: articulate the concepts of coding for reliable Communication 3 - - - - - - - - - - - 3 - -
utilize the skills learned during the design and integration of the fiber optic mode of Communication in
CO-4: 3 - - 3 - - - - - - - - 2 - -
any system under development
demonstrate the design and integration of the satellite mode of Communication in any system under
CO-5: 3 - - - - - - - - - - - 2 - -
development

Unit-1 – Introduction to Communication System 9 Hour


Introduction – Significance of human Communication, Communication systems, Communication channel, Types of electronic Communication, simplex, Full duplex, half duplex, Analog and Digital signals, Modulation
and multiplexing, Baseband transmission, Broadband transmission, Multiplexing, Electromagnetic spectrum, Frequency and wavelength, Optical spectrum, Bandwidth, Channel Bandwidth, Effect of Noise on Analog
Communication systems
Unit-2 – Information Coding 9 Hour
Introduction to information sources and source coding, Modelling of information sources, Source Coding Theorem, Source Coding Algorithms: Huffman source coding algorithm, Lempel-Ziv source coding algorithm,
Rate distortion theory: Mutual information, Differential Entropy, Rate distortion function - Quantization, Waveform Coding: PCM, DPCM, Delta modulation, Digital audio transmission and digital audio recording, Digital
audio in telephone transmission systems, Digital audio recording
Unit-3 – Coding for Reliable Communication 9 Hour
Tight bound on error probability of orthogonal signals, The promise of coding, Linear Block Codes, Theorem on Linear code, Hamming Codes, Decoding and performance of linear block codes, Soft decision
decoding, Hard decision decoding, Error detection and Error correction, Burst error correcting codes, Cyclic codes, The structure of cyclic codes, The generator matrix, Encoding of cyclic Coupling Losses Equivalent
Noise codes, BCH Codes, Reed-Solomon Codes, Convolutional Codes, Basic properties of convolutional codes, Encoding, The transfer function, Catastrophic codes, Optimum decoding of convolutional codes -
The Viterbi algorithm.
Unit-4 - Fibre Optic Communication 9 Hour
Introduction Through Optical Fiber, Electromagnetic Spectrum, Types of Optical Fibres, Propagation of Light, Single Mode Fibre, Multimode Fibre, Losses Within an Optical Fiber: Attenuation Loss, Absorption Loss,
Radiation Loss, Dispersion Loss, Rayleigh Scattering Loss, Modal Dispersion Loss, Coupling Losses, Optical Point-to-point Communication Systems: Single Channel System Amplified Single Channel System,
Wavelength Division Multiplexing (WDM) Systems
199
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Satellite Communication 9 Hour
Introduction, Basic Satellite Transponder Kepler’s Laws, Kepler’s First Law Kepler’s Second Law Kepler’s Third Law, Satellite Orbits: Low Earth Orbit Satellite Medium Earth Orbit Satellite, Satellite Orbital Patterns
Inclined Orbits Equatorial Orbit, Polar Orbits, Geostationary Satellites, Geosynchronous Satellite, Power Systems, Altitude Control: Spin Stabilized, Spun/de-spun Stabilization Method, Three-axis Stabilized Method,
Altitude Control Components: Sensors, Actuators, Satellite System Parameters, Equivalent Noise, Temperature Carrier-to-Noise Density Ratio, Energy of Bit-to-Noise Density Ratio, Satellite System Link Models,
Satellite System Link Equation 636 Uplink Power Budget Calculation, Satellite Radio Navigation

1. Louis E. Frenzel, Principles of Electronic Communication Systems, 4th Edition, Tata 3. Communication Systems, V. Chandra Sekar, Oxford University Press, 2015(Unit - IV &Unit-V)
Learning McGraw Hill Education, 2019. (Unit -I)
Resources 2. Ohn G. Proakis, Masoud Salehi, Communication Systems Engineering, 2nd edition,
Pearson Education International, 2015. (Unit - II & Unit -III)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 30% - 30% - 30% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.J.Dayanithi, Senior Consultant, Verizon 1. Dr.V.Vijayarajan, Associate Professor, 1. Mrs. V.Vijayalakshmi, SRMIST
Data Services Private Ltd. Vellore Institute of Technology, Vellore

200
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE263T DIGITAL COMMUNICATION SYSTEMS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline the framework of digital communication systems 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: discover and correlate the digital coding techniques

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: illustrate and prioritize the various digital modulation schemes

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: adapt and validate with error control coding methods

Environment &
Sustainability
CLR-5: assess and classify the significance of multiplexing and multiple access

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: recognize the essentials of digital communication system 2 - - - - - - - - - - - 3 - -
CO-2: interpret the concepts on sampling, Quantization, encoding and Signal Compression 2 3 - - - - - - - - - - 3 - -
CO-3: identify the various digital modulation techniques for various signals 2 3 - - - - - - - - - - 3 - -
CO-4: examine the error Detection and Correction codes 2 3 - - - - - - - - - - 3 - -
CO-5: analyze the multiplexing and multiple access techniques 2 - - - - - - - - - - - 3 - -

Unit-1 - Introduction Digital Communication System 9 Hour


Advantages of Digital Communication-Regeneration of Digital Signals, Power Efficiency of Digital Modulators Bandwidth Compression, - Multimedia: Unification of Signals Performance, Technology -Time and
Frequency Representation - Fourier Series, Fourier Transform - Discrete Fourier Transform - Convolution - Correlation - Hilbert Transform - Low-pass and Band-pass Representations - Signals and Systems:
Analytic Signals, Low-pass Equivalent Signals - Signal Space Representations: Vector Space
Unit-2 – Digital Coding Techniques 9 Hour
Digitizing Analog Signals - Sampling - Quantization - Encoding - Signal Compression, Signal Statistics and Redundancy - Companded PCM - Predictive Coding - Transform Coding - Parametric Coding - Perceptual
Coding - Application of Digital Coding- Digital Speech - Adaptive Delta Modulation Codec- Pulse Code modulation Codec - Digital Audio: MP3 Coding - Digital Video: Run Length Coding, variable Length Coding -
MPEG1
Unit-3 - Digital Modulation Techniques 9 Hour
Baseband Modulation - Pulse Modulation Systems - Baseband Signalling - Correlative Coding: Duo-Binary Coding, Modified Duo-Binary Coding- Digital Phase Modulation(Phase Shift Keying): Bi-phase shift keying
modulation - Quadrature and Offset Quadrature phase shift keying - Digital Frequency Modulation(Frequency Shift Keying), Minimum Shift Keying, Gaussian Minimum Shift Keying, - Continuous Phase
Modulation, Baseband Signals, Band-pass Signals - Comparison of Basic Modulations Orthogonal Frequency Division Multiplexing
Unit-4 – Error Coding and Decoding 9 Hour
Introduction-Types and Measure of Error- Shannon-Hartley Capacity Theorem - Methods of Error Control-Classification of Error-Correcting Codes - Linear Block Codes-Hamming Distance, Weight, Error Detection,
Correction - Linear Block Codes-Generator Matrix, Systematic codes, Parity Check Matrix Standard Array - Implementing the decoder Cyclic Codes-Generator Polynomial for cyclic code - Systematic Cyclic code -
Polynomial Multiplication and division - Importance of Block Codes-Hamming Codes, Golay-Reed Solomon Codes, Convolutional codes, Convolutional Encoder - Convolutional Decoding, Maximum like hood
Decoding, Viterbi algorithm, Sequential Decoding and Fano Algorithm, Practical Applications of Error Correcting codes, Deep Space Communication, Satellite Communication

201
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 – Multiplexing Techniques 9 Hour
Introduction to Multiplexing-Types - Frequency Division Multiplexing, Time Division Multiplexing - Frame Synchronization - Primary Multiplexing in Digital Telephony - Higher Order Multiplexing - Multiple Access-
Frequency Division Multiple Access, Time Division Multiple Access, Code Division Multiple Access, Random Access, Carrier Sense Multiple access/Collision Detection, Fixed Assignment Multiple Access, Demand
Assignment Multiple Access - Introduction to Pseudo-Noise Sequence - Properties of PN Sequences - Spread Spectrum: Direct Sequence Spread Spectrum(DSSS), Frequency Hopping Spread Spectrum(FHSS),
Spread Spectrum Applications

1. R.N. Mutagi, Digital Communication – Theory, Techniques and Applications, 2nd Edition, 6. Simon Haykin, “Communication Systems”, John Wiley & Sons, 4th Edition, 2008.
Oxford University Press, 2014. 7. Bernard Sklar, “Digital Communication, Fundamentals and Application”, Pearson Education
2. John R. Barry, Edward A. Lee, David G. Messerschmitt, Digital Communication, 3rd Edition, Asia, 2nd Edition, 2001
Springer International Edition, Springer,2011 8. Taub & Schilling, “Principle of Communication Systems”, McGraw Hill Inc, 2nd Edition, 2003.
Learning 3. JohnG.Proakis,Masoud 9. B.P. Lathi, “Modern Digital and Analog Communication System”, Oxford University Press,
Resources Salehi,DigitalCommunications,5thEdition,McGrawHillEducation,2015 3rd Edition, 2005.
4. Simon Haykin and Michael Moher, “Communication Systems,” 5th edition, John Wiley & 10. Shu Lin, Daniel Costello, “Error control coding – Fundamentals and Applications”, Prentice
Sons, 2013 Hall, Upper Saddle River, NJ, 2nd Edition, 2004.
5. Singh. R. P &Sapre. S. D, “Communication Systems: Analog & Digital,” 3rd edition, McGraw-
Hill Education, Seventh Reprint, 2016.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 30% - 30% - 30% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. V. Lingasamy, ME, PhD, Sr. Technical Lead 1. Dr.K.R. Jothi Associate Professorship of Computational Intelligence, School of Computer Science 1. Mr.H.Karthikeyan, SRMIST
at Sterlite Technologies Limited, Chennai and Engineering, Department of Information Technology, Vellore Institute of Technology, Vellore

202
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE330T CLOUD ARCHITECTURE E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: review the fundamentals of cloud architecture 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: infer the technologies used with cloud platforms

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: discover the advance cloud architecture and storage structures

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: classify the importance of cloud architecture design

Environment &
Sustainability
CLR-5: examine virtualization architecture and future trends in cloud structures

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: persist the concept of basic cloud computing paradigms 3 - - - - - - - - - - - - - 3
CO-2: interpret the concepts of Cloud service structures 3 - - - - - - - - - - - - - 3
CO-3: analyze the components of cloud computing and about business agility in an organization 3 - - 2 - - - - - - - - - - 3
CO-4: relate with the market service providers in cloud 3 - - 2 - - - - - - - - - - 3
CO-5: evaluate data center technologies and cloud architecture patterns 3 - - 2 - - - - - - - - - - 3

Unit-1 - Introduction 9 Hour


Introduction to cloud computing fundamental, Cloud Computing definition, Cloud deployment models, Private, Public, Hybrid, community cloud, Cloud services: IaaS, PaaS, SaaS, Enabling technologies of cloud
computing, Benefits and challenges of cloud computing, Business Agility: Benefits and challenges to Cloud, architecture. Cloud Applications, Application availability, Performance, Various types of disaster in cloud
environment.
Unit-2 - Service Oriented Architecture 9 Hour
REST, Systems of Systems, Web Services, Publish-Subscribe Model, Basics of Virtualization, Types of Virtualizations, Implementation Levels of Virtualization, Virtualization Structures- Advantages and
Disadvantages, Tools and Mechanisms, Virtualization of CPU Memory, I/O Devices, Virtualization Support and Disaster Recovery, Server Virtualization, Parallel Processing, Vector Processing, Symmetric
Multiprocessing Systems, Massively Parallel Processing Systems.
Unit-3 - Cloud Storage Infrastructures 9 Hour
Introduction to cloud storage infrastructures, Concept, planning and Design, Business continuity ,Basic concepts of information security, Managing VDC and cloud environments and infrastructures, Securing storage
in virtualized and cloud environments, Monitoring and management, Security auditing and SIEM, Storage Network Design, Architecture of storage, analysis and planning, Storage network design considerations,
NAS and FC SANs, Hybrid storage networking technologies, iSCSI, FCIP, FCoE, Design for storage virtualization in cloud computing, Host system design considerations, Cloud Applications, Technologies and the
processes required for deploying web services.

203
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 – Resource Provisioning 9 Hour
Management of Cloud Services, Reliability, availability and security of services deployed from the cloud, Performance and scalability of services, Tools and technologies used to manage cloud services deployment,
Cloud Economics, Cloud Computing infrastructures available for implementing cloud based services, Economics of choosing a Cloud platform for an organization, Runtime Support Services Resource Provisioning
and Platform Deployment- Provisioning of Compute Resources (VMs),Resource Provisioning Methods, NIST Cloud Computing Reference Architecture, Demand-Driven, Event-Driven Resource Provisioning,
Popularity-Driven Resource Provisioning, Dynamic Resource Deployment Storage-as-a-Service, Advantages of Cloud Storage - Global Exchange of Cloud Resources Application Development. Service creation
environments to develop cloud-based applications
Unit-5 – Data Center Design 9 Hour
Introduction to Cloud Architecture patterns, Horizontally Scaling Compute Pattern- Cloud Significance, Queue-Centric Workflow Pattern Auto-Scaling Pattern, Eventual Consistency Prime, MapReduce Pattern,
Database Sharding Pattern, Node Failure Pattern, Network Latency Primer CDN Pattern, Multisite Deployment Pattern, Network connectivity optimization evolution: Top of rack (TOR), end of rack (EOR), connectivity,
Stand-alone, blades, stateless, clustering, scaling optimization, virtualization, Limitation of traditional server deployments, Case studies

1. Gautam Shroff, “Enterprise Cloud Computing Technology Architecture Applications”, Cambridge 6. Klaus Schmidt, “High Availability and Disaster Recovery” Springer; edition [ISBN: 978-
University Press; 1 edition, [ISBN: 978-0521137355], 2010. 3540244608], 2006.
2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical Approach” McGraw- 7. Kai Hwang, Geoffrey C. Fox, Jack G. Dongarra, "Distributed and Cloud Computing,
Hill Osborne Media; 1 edition [ISBN:0071626948],2009 From Parallel Processing to the Internet of Things", Morgan Kaufmann Publishers, 2012.
Learning
3. Greg Schulz, “Cloud and Virtual Data Storage Networking”, Auerbach Publications [ISBN: 978- 8. Rittinghouse, John W., and James F. Ransome, ―Cloud Computing: Implementation,
Resources
1439851739],2011 Management and Security, CRC Press, 2017.
4. EMC, “Information Storage and Management” Wiley; 2ndedition [ISBN: 978-0470294215], 2012. 9. Silvano Gai, Claudio DeSanti, “I/O Consolidation in the Data Center” Cisco Press;
5. Volker Herminghaus, Albrecht Scriba, “Storage Management in Data Centers” Springer; edition 1stedition [ISBN: 9781587058882], 2009.
[ISBN: 978- 3540850229], 2009. 10. Bill wilder, Cloud Architecturepatterns,2012

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.PartheepanRudrapathi, CEO, KXE 1. Dr.V.Arulkumar, Associate Professor, SSN College of Engineering 1. Dr.M. Shobana, SRMIST

204
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE329T SERVICE ORIENTED ARCHITECTURE AND MICROSERVICES E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: state the fundamentals XML and AWS 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: develop an application based on XML and XSL

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: explore the key principles behind SOA

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: illustrate the web services technology elements for realizing SOA

Environment &
Sustainability
CLR-5: compare the various web service standards

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: explain the fundamentals of XML and AWS 2 - - - - - - - - - - - 3 - -
CO-2: test the applications based on XML 2 3 - - - - - - - - - - 3 - -
CO-3: illustrate the key principles behind SOA 2 - 2 - - - - - - - - - 3 - -
CO-4: implement the web services using technology elements 2 3 - - - - - - - - - - 3 - -
CO-5: apply the various web service standards to solve real world problems 2 3 2 - - - - - - - - - 2 - -

Unit-1 - XML 9 Hour


Introduction to XML, Amazon Web Services, XML in Context, Fundamentals of XML, XML Document Structure, XML Content Models, Rules of XML, Structure - Well-formed and valid documents, Linking XML
Documents Together, Namespaces, Identifying the Scope of Namespaces, DTD, Structure of a Document, Type Definition, XML Schema, X-Files, Getting started with AWS, AWS Compute, Storage, Networking,
Amazon EC2
Unit-2 – Dynamic Modeling 9 Hour
Parsing XML – using DOM, DOM Traversal and Range, SAX, Working with SAX-Handling Errors, XML, Transformation and XSL, XSLT for Document Publishing, XSL for Business-to-Business (B2B) Communication,
XSL Formatting, Modeling Databases in XML, Developing a Data Access Object (DAO), Developing a Servlet for HTTP Access-- Testing the Application- Converting the XML Data to HTML with XSLT, Converting
the XML Data to HTML, Converting the XML Data to HTML with XSLT, Java Architecture for XML Binding (JAXB), Data Binding
Unit-3 – Service Oriented Architecture 9 Hour
Service-Oriented Architecture Concepts, SOA Processes, Principles and Tools, SOA Governance Policies and Processes, SOA Principles and Guidelines, Line of Business Services, Reusable Technical Services,
Roots of SOA, Characteristics of SOA, Comparing SOA with Client-Server, Distributed architectures, Benefits of SOA, Technical Benefits, Business Benefits-Increased Business Agility, Better Business Alignment,
Principles of Service orientation, Service layers
Unit-4 – Web Service Description Language 9 Hour
Service descriptions –WSDL– Basic WSD, Syntax, SOAP Binding-Messaging with SOAP –Service discovery, UDDI– Introduction to UDDI, Structure of UDDI Message Exchange Patterns, Orchestration –
Choreography –WS Transaction, B- WS-Atomic Transaction – WS – Business Activity, WS-Coordination Framework, WS-Transaction Management

205
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 – Web Service Security 9 Hour
Service Oriented Analysis and Design, – Service Modeling –Design standards, guidelines, Composition, WS-BPEL, WS-Coordination, WS-Policy, WS-Security –WS Trust, WS-Secure Conversation, WS-Federation-
Security Assertion Markup Language (SAML), Data-Level Security XML Encryption-XML Signature, SOA support in J2EE

1. Ron Schmelzer et al. “XML and Web Services”, Pearson Education, 2002. 5. Sandeep Chatterjee and James Webber, “Developing Enterprise Web Services: An Architect’s
2. Thomas Erl, “Service Oriented Architecture: Concepts, Technology, and Design”, Guide”, Prentice Hall, 2004
Pearson Education, 2005. 6. James McGovern, Sameer Tyagi, Michael E.Stevens, Sunil Mathew, “Java Web Services
Learning
3. Frank P.Coyle, “XML, Web Services and the Data Revolution”, Pearson Education, Architecture”, Morgan Kaufmann Publishers, 2003
Resources
2002. 7. https://docs.aws.amazon.com/whitepapers/latest/aws-overview/compute-serviceshtml#amazon -ec2
4. Eric Newcomer, Greg Lomow, “Understanding SOA with Web Services”, Pearson
Education, 2005.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 30% - 30% - 30% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.T.Ananadharaman ,Project Manager, TCS, Chennai 1. Dr.T.Sudalaimuthu, Professor, 1. Dr.N.Senthamarai, SRMIST
Hindustan Institute of Science and Technology, Chennai

206
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE363T CLOUD SERVICES SOLUTION ARCHITECT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: discuss the concepts of Computing instances and database service in AWS platform 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: articulate of logical, secured Networking groups and applying Cloud Content Delivery in AWS

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: apply Security measures to protect the resources and understands compliance management in AWS

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: demonstrate Management and Governance services at cloud deployment model

Environment &
Sustainability
CLR-5: categorize the different migration service systems and different application integration services

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: demonstrate on Computing instances and database service in AWS 2 - - - - - - - - - - - - - 3
CO-2: implement Networking and Cloud front Content Delivery in AWS 3 - - - - - - - - - - - - - 3
CO-3: examine Security measures and compliance in AWS 2 - - 3 - - - - - - - - - - 3
CO-4: interpret management and governance services - 3 - - - - - - - - - - - - 3
CO-5: compare different migration services and application integration services in AWS - - - 3 - - - - - - - - - - 3

Unit-1 – Introduction to AWS 9 Hour


Compute: Amazon EC2, AWS Elastic Beanstalk, Amazon Elastic Container Service (Amazon ECS), Amazon Elastic Kubernetes Service (Amazon EKS), Elastic Load Balancing, AWS Fargate, AWS Lambda.
AWS Billing and Cost Management: AWS Budgets and Cost Explorer. Database: Amazon Aurora, Amazon DynamoDB, Amazon DynamoDB Accelerator (DAX).
Unit-2 – AWS Gateway Services 9 Hour
Networking and Content Delivery: Amazon API Gateway, Amazon CloudFront, AWS Direct Connect, AWS Global Accelerator, Amazon Route 53, AWS Transit Gateway, Amazon VPC (and associated features)
Unit-3 – Identity and Access Management 9 Hour
AWS Identity and Access Management (IAM), AWS Key Management Service (AWS KMS), AWS Shield, AWS Single Sign-On, AWS WAF
Unit-4 - Management and Governance 9 Hour
AWS Auto Scaling, AWS Backup, AWS CloudFormation, AWS CloudTrail, Amazon CloudWatch, AWS Config. AWS Organizations, AWS Resource Access Manager, AWS Systems Manager, AWS Trusted
Advisor
Unit-5 - Migration and Transfer 9 Hour
AWS Database Migration Service (AWS DMS), AWS Server Migration Service (AWS SMS), AWS Snowball, AWS Transfer Family. Application Integration: Amazon SNS and SQS

1. Piper, B., & Clinton, D. (2020). AWS Certified Solutions Architect Study Guide: Associate 3. Sequeira, A. (2019). AWS Certified Solutions Architect-associate (SAA-C01) Cert Guide.
Learning
SAA-C02 Exam. John Wiley & Sons. Pearson IT Certification.
Resources
2. https://docs.aws.amazon.com/

207
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 15% - 15% -
Level 2 Understand 20% - 15% - 15% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 10% - 15% - 15% -
Level 6 Create 10% - 15% - 15% -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Mohit Kumar, Senior Data Scientist, 1. Dr.M.Saravanan, SRMIST
Verizon,Bangalore,Karnataka,India
2. Ms.V.Lavanya, ,SRMIST

208
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE364T DATA CENTRIC NETWORKING AND SYSTEM DESIGN E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: describe various data centric Networking Concepts 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: gain knowledge on the data center architectures & network connectivity

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: articulate networking caching policies

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the security issues in data centric networks

Environment &
Sustainability
CLR-5: learn the application of IoT in ICN

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify various data centric networking concepts - 2 - 3 - - - - - - - - - - 3
CO-2: distinguish different data center architectures & core network connectivity issues - 2 - 3 - - - - - - - - - - 3
CO-3: design the caching policies in DCN - 2 - 3 - - - - - - - - - - 3
CO-4: protect the Data centric networks from different attacks - 2 - 3 - - - - - - - - - - 3
CO-5: make use of IoT and ML techniques in Data centric networks for more efficient - 2 - 3 - - - - - - - - - - 3

Unit-1 - Introduction 9 Hour


Introduction to Information-Centric Networks, Data-centric networking from different perspectives, Requirements for modern data centers, Internet architecture, Content Distribution Networks (CDN), Content-Centric
Communication, Characteristics of ICN, Design Principles, and Assumptions, Design Principles, Key Building Blocks of ICN and Design Challenges, TRIAD Architecture, DONA Architecture.
Unit-2 – Data Center Design 9 Hour
Network Information (NetInf) Architecture, Top of rack (TOR)network connectivity, End of rack (EOR) network connectivity, NDN Architecture, Comparative Analysis of ICN Architectures, Software-Defined Networking
in ICN, Data Routing Schemes, Realization of Routing in ICN, Stateful Forwarding Paradigm for NDN, OSPF-Based Routing for NDN- NLSR.
Unit-3 – Computing Architecture 9 Hour
Introduction to server Architectures, clustering in server architectures, Redundant Layer 2 designs, Redundant Layer 3 design, Network Caching, Issues in ICN Caching, Leave Copy Everywhere (LCE), Leave Copy
Down, SDN Based Caching, Analysis of Various Caching Methods, Caching policies, Caching with Amazon Elasti Cache.
Unit-4 – Data Centric Networking Protocols 9 Hour
RSTP protocol, PVST protocol, Monitoring Your Applications and Infrastructure - Working with AWS CloudTrail, MSTP protocol, TRILL protocols Security in DCN, Key Security & Privacy Concerns in ICN
Architectures, Attacks in ICN, Naming, routing related attacks, ICN Attributes Leading to Security Threats, Optimization in ICN, Application of ML in Communication Networks, ML in caching, naming, Routing
Unit-5 – Data Centric Services 9 Hour
State-of-the-Art Work in SDN-Based ICN, CORNET architecture, Recent Trends in ICN Applications, Data-Centric Networks in Internet of Things, Adaptation of Information-Centric Networks for Internet of Things
(IoT): Challenges and Opportunities, Design Issues of IoT over ICN, Information-Centric Networks in Wireless, Sensor Networks, ICN-based VANETs, Locator Identifier Separation Protocol (LISP)

209
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Zhi-Li Zhang,”Information Centric Networks (ICN),Nitul Dutta · Hiren Kumar Deva 5. Silvano Gai, TommiSalli, RogerAndersson, “Cisco Unified Computing System”
Sarma,Rajendrasinh Jadeja · Krishna Delvadia,GheorghitaGhinea,Architecture & Current CiscoPress; 1stedition, [ISBN: 9781587141935], 2010.
Trends,2021 6. Information Centric Networks: A New Paradigm for the Internet by Released May
2. MouricioArregoces, “Data Centre Fundamentals”, CiscoPress,2003 2013 Publisher(s): Wiley ISBN: 9781848214491
Learning
3. SilvanoGai, Claudio DeSanti, “I/O Consolidation in the Data Center” Cisco Press; 1st edition [ISBN: 7. RobertW.Kembel, Roger Cummings (Introduction), “The Fibre Channel Consultant”
Resources
9781587058882], 2009. Northwest Learning Assoc; 3rdedition, [ISBN: 0931836840], 1998.
4. KevinCorbin, Ron Fuller, DavidJansen, “NX-OSandCiscoNexusSwitching: Next-Generation Data 8. Robert W Kembal “FiberChannelSwitchedFabric”Northwest Learning Associates, inc.
Center Architectures”CiscoPress; 1 edition [ISBN: 9781587058929], 2010. [ISBN: 0931836719], 2009.
9. JohnL.Hufferd, “ISCSI”, Addison-WesleyBoston [ISBN: 978-0201784190], 2003.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 30% - 30% - 30% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.N. Vijaya Sankar Associate Tech Lead 1. Dr.Soundarrajan Program Chair, Associate Professor, in the Department of Computer 1. Dr. V.Pandimurugan, SRMIST
MST Solutions Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham,
[email protected]

210
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE461T CLOUD SECURITY E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: identify the concept of cloud security 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: compute the issues related to virtualized infrastructure security

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: predict and Gain knowledge on the various issue in cloud security

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: contrast the methods to improve virtualization security and technologies in security

Environment &
Sustainability
CLR-5: design the cloud contracting Model and case study of commercial cloud

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: demonstrate the main concepts of cloud security 3 - - - - - - - - - - - - - 3
CO-2: illustrate the architecture design of cloud storage 3 - - - - - - - - - - - - - 3
CO-3: classify the cloud security key management Schemes 3 2 - - - - - - - - - - - - 3
CO-4: categorize the types of attacks and phases of malware 3 - - - - - - - - - - - - - 3
CO-5: summarize the security design for cloud Models 1 - 3 - - - - - - - - - - - 2

Unit-1 - Introduction 9 Hour


Cloud Security Fundamentals- Infrastructure Security- Network level security- Host level security- Application-level security- Data security and Storage- Data privacy and security Issues- Jurisdictional issues raised
by Data location- Identity & Access Management- Access Control- Trust, Reputation- Risk.
Unit-2 - Information Gathering and Footprinting 9 Hour
Layered Cloud Architecture Design- NIST cloud computing Reference Architecture-Public, Private and Hybrid Cloud- IaaS, PaaS, SaaS - Architectural design Challenges- Cloud Storage- Storage-as-a-service-
Advantages of Cloud storage- Cloud storage Provider- Storage Provider-S3
Unit-3 - Web and Database Attacks 9 Hour
Confidentiality, privacy, integrity, authentication, - non-repudiation, availability, access control, defense in depth, least privilege- Cryptographic Systems- Symmetric cryptography- stream ciphers, block ciphers,
modes of operation- Public-key cryptography, hashing- digital signatures, public-key infrastructures- key management for IaaS, PaaS, SaaS - Cryptographic key Management Issues and challenges in cloud services.
Unit-4 - Attacks and Malware Lifecycle 9 Hour
Multi-tenancy software and its issues- IBM security virtual server protection- virtualization-based sandboxing- Cloud Storage- Security- HIDPS- log management- Data Loss Prevention- Security Governance- Cloud
security Challenges- Virtual Machine Security- ESX, ESX File system Security Storage considerations- ESIX security- Security Management Standards- SaaS, PaaS, and IaaS Availability management.
Unit-5 - Wireless Security Technologies 9 Hour
Authentication in cloud computing- Client access in cloud- Cloud contracting Model- Commercial and business considerations- Case Study on Open Source & Commercial Clouds- X.509 certificates, OpenSSL-
Eucalyptus- Microsoft Azure- Amazon EC2- Legal and Compliance Issues in Cloud Computing- Examination of modern security standards.

211
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Rittinghouse, John W., and James F. Ransome, ―Cloud Computing: 4. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing – A Practical Approach, Tata
Implementation, Management and Security, CRC Press, 2017. Mcgraw Hill, 2009.
Learning 2. Kai Hwang, Geoffrey C Fox, Jack G Dongarra, “Distributed and Cloud Computing, 5. Tim Mather, SubraKumaraswamy, ShahedLatif, “Cloud Security and Privacy: An Enterprise
Resources From Parallel Processing to the Internet of Things”, Morgan Kaufmann Publishers, Perspective on Risks and Compliance” O'Reilly Media; 1stedition [ISBN: 0596802765], 2009.
2012. 6. George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in the
3. Ronald L. Krutz, Russell Dean Vines, “Cloud Security” [ISBN: 0470589876], 2010. Cloud: Transactional Systems for EC2 and Beyond (Theory in Practice), O’Reilly, 2009

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 30% - 30% - 30% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.T. Madhan, Team Leader, Tata Consultancy Services, 1. Dr. S. Janakiraman, Associate Professor, Pondicherry University, 1. Dr. R. Naresh, SRMIST
siruseri Campus, Chennai, [email protected] [email protected]
2. Mrs.K.Saranya, IT Analyst, Tata Consultancy Services, 2. Dr. R.Shyamala, Associate Professor, Anna University College of 2. Dr. C.N.S. Vinoth Kumar, SRMIST
siruseri Campus, Chennai, [email protected] Engineering Tindivanam, [email protected]

212
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE463T CLOUD STRATEGY PLANNING AND MANAGEMENT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the concepts and technological advances fueling the rapid adoption of cloud computing today 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
apply the skills and knowledge required to plan and manage a Cloud Computing strategy within an

The engineer and society


CLR-2:

Conduct investigations of

Individual & Team Work


Engineering Knowledge
organization

Design/development of

Project Mgt. & Finance


CLR-3: interpret the strategic value of Cloud Computing using IT Governance and Compliance

Modern Tool Usage

Life Long Learning


complex problems
Problem Analysis

Communication
CLR-4: illustrate the Service Oriented Architecture Services, Databases and Applications

Environment &
Sustainability
CLR-5: explore about IT Governance benefits and services along with Asset Management

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: demonstrate how cloud computing enables IT Transformation and business value in an organization 3 - - - - - - - - - - - - - 3
CO-2: examine the role that cloud computing can play in the business process 3 3 - - - - - - - - - - - - 3
appraise how the incorporation of cloud computing in an IT strategy can deliver on strategic business
CO-3: 3 - - - - - - - - - - - - - 3
objectives
CO-4: criticize how cloud computing and Service Oriented Architecture (SOA) can deliver business agility 3 3 - - - - - - - - - - - - 3
CO-5: implement IT governance to manage business realization from cloud IT services 3 - - 3 - - - - - - - - - - 3

Unit-1 - Introduction 9 Hour


The four pillars of cloud computing - Cloud applications and platforms providing the cloud infrastructure - Cloud computing - Spectral efficiency - Sensors and perspiration - Strategic inflection points in information
Technology - Cloud computing and its slogans -User centered solution and cloud computing - For cloud vendors inflection point Is risk and opportunity - Potential customers of cloud technology - The cloud interests
Small and Medium enterprises - Virtual companies and the cloud - Virtual networked objects - Consumer technologies and the cloud - Social networks and multimedia messaging
Unit-2 – Infra Structure Design 9 Hour
Moving to a cloud architecture and strategy to achieve business value - BPM, IS, Porter’s Value chain model and BPR as a means of delivering business value - Developing Business Strategy: Investigate business
strategy models to gain competitive advantage for organizations - SWOT/PEST, Economies of scale, Porter’s 3 Strategies and 5 Competitive Forces, D’Aveni’s hyper competition models - Emphasize the roles of
the strategic IS/IT leaders such as Chief Information Officer (CIO) - The Chief Technology Officer (CTO) in planning and managing IT Strategic development in the organization - Budgeting for cloud computing -
Service level agreements - Outsourcing, Infrastructural inter dependencies, and the cloud - Human resources at the CIO level - The transition from legacy to competitive system
Unit-3 – Design Strategies 9 Hour
Develop an IT strategy to deliver on strategic business objectives in the business strategy - IT Project planning in the areas of IaaS is essential in delivering a successful strategic IT Plan - IT Project planning in the
areas of SaaSis essential in delivering a successful strategic IT Plan - IT Project planning in the areas of PaaSis essential in delivering a successful strategic IT Plan - IT Project planning in the areas of IaaSis
essential in delivering a successful strategic IT Plan - Searching for an open architecture - Infrastructure as a Utility - Cloud System Architecture and its primitives - The User Organizations Business Architecture -
Financial Services Applications Architecture

213
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 – Cloud Service Management 9 Hour
Shared services delivered by a Service Oriented Architecture (SOA) in a Private or Public Cloud - Services, Databases and Applications on demand - The effect on Enterprise Architecture and its traditional
frameworks such as Zachman).- The Open Group Architecture Framework (TOGAF) - Customer Relationship Management - Enterprise Resource Planning - Just-in-Time Inventories - Machine-to-Machine and
RFID Communications - Challenges Presented by Organization - Challenges Presented by Commercial vision
Unit-5 – Governance and Asset Management 9 Hour
Benefit Realization and IT Governance - Managing resources (people, process, technology), to realize benefit from Private/Public Cloud IT services - Gartner's 5 pillars of benefit realization - IT governance as a
service in measuring the delivery of IT Strategy from Cloud IT Services using Sarbannes Oxley (CobiT) and other commonly-used approaches - High Technology for private banking and Asset Management - Cloud
Software for Private Banking - Leadership is based on Fundamentals - Cloud Software For Asset Management - Cloud Technology can Improve Fund Management - Criteria of Success in Asset Management
Technology

1. Dimitris N. Chorafas: Cloud Computing Strategies, CRC Press, 2011. 3. David S. Linthicum, “Cloud Computing and SOA Convergence in Your Enterprise”, Addison
Learning 2. Arnold J Cummins, “Easiest Ever Guide to Strategic IT Wesley [ISBN: 0136009220],2009.
Resources Planning”http://strategicitplanningguide.com/. 4. Charles Babcock, “Management Strategies for the Cloud Revolution”, 1st Ed., Tata McGraw/Hill
[ISBN: 0071740759],2010.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 30% - 30% - 30% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sudhakar E P Development Project Leader at American 1. Dr.Khanna Nehemiah H, Professor, Ramanujan Computing Centre, 1. Mrs.V.Lavanya, SRMIST
Megatrends International India (P) Ltd Anna University

214
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE464T FOG COMPUTING ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: annotate the concepts of fog and edge computing 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: relate simulation tools of fog computing

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the component, architecture and working model

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: examine different security methods and use cases

Environment &
Sustainability
CLR-5: utilize big data analytics for fog computing

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: express the knowledge on the concepts of fog and edge computing 3 - - - - - - - - - - - - - 3
CO-2: infer simulation tools of fog computing 3 - - - 3 - - - - - - - - - 3
CO-3: interpret the component, architecture and working model 2 - - - 3 - - - - - - - - - 3
CO-4: correlate different security methods and use cases 3 - - - - - - - - - - - - - 3
CO-5: identify the role of big data analytics in fog computing 3 - - - - - - - - - - - - - 3

Unit-1 - Edge and Fog Computing Techniques 9 Hour


Introduction to Edge Computing, Infrastructure of edge computing, Benefits of Edge computing, Edge devices and Edge Services, Applications of Edge technology AWS IoT, AWS Outposts, Introduction to Fog
Computing, Characteristics of fog Computing, Reason for fog Computing, Challenges, Advantages and disadvantages, Fog
services, Application scenarios –Health care, Sensors and Fog nodes, Difference between edge and fog computing, AWS Local zones, AWS Wavelength
Unit-2 - Modeling and Simulation Tools 9 Hour
Working procedure of fog computing, Software Systems, Components of fog computing, Modeling and Simulation, Simulation tools, Ifogsim, Characteristics of ifogsim, Working of ifogsim, Contiki – Characteristics,
MAC protocol, Routing protocol simulation in contiki, Working procedure, MobFogsim – Protocols, Implementation of MobFogsim, AWS Infrastructure and services, Comparison of different simulator, AWS Device
defender, AWS Device management IoT Events, AWS IoT Events
Unit-3 - Fog Data Analytics for Lot 9 Hour
Fog Protocol, JSON based protocol, Fog interfaces with IoT, Fog interfaces with Cloud, Fog Networking, SDN, NFV, Other fog networking, Protocol Optimization, Fog kit, Fog kit-framework,Fog hardware framework,
Fog software framework, Proximity Detection protocols, DDS/RTPS computing protocols, AWS IoT Greengrass, Amazon EC2
Unit-4 - Fog Data Analytics Security and Privacy 9 Hour
Quality of Service (QoS) and Management, Computation Offloading, Resource Provisioning, Security and Privacy, Security attacks on fog computing, Trust and authentication, Network security, Secure and Private
Data Computation, Intrusion Detection, Multimedia fog computing, Case study, Smart Traffic Light System, Wearable Sensing devices, Smart Home, Security services on AWS, Resource allocation in AWS, Compare
cloud and Fog resource allocation – AWS

215
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Fog Computing for Big Data Analytics 9 Hour
Big Data analytics, Benefits of Big data analytics, A Typical Big Data Analytics Infrastructure, Big Data Analytics in the Cloud, Data Analytics in the Fog, Fog analytics, Smart management of Big Data in Fog, System
Architecture, Fog engine, Data analytics using Fog engine, Architecture of Fog-engine, Challenges and issues, Fog-engine prototype, Configuration of fog engine, AWS IoT Analytics, Comparison of Fog-engine and
cloud data analytics, Application of Big Data, Amazon kinesis data analytics

1. Fog and Edge Computing: Principles and Paradigms. United Kingdom: Wiley, 2019. 3. Fog Computing: Theory and Practice, Assad Abbas, Samee U. Khan, Albert Y. Zomaya, Wiley, 2020
Learning
2. Fog Data Analytics for IoT Applications: Next Generation Process Model with State 4. https://staff.cdms.westernsydney.edu.au/~bjavadi/papers/Chapter11_javadi.pdf
Resources
of the Art Technologies. Germany: Springer Singapore, 2020.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 30% - 30% - 30% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. PratheepanRudrapati, CEO, Knowledge Xchange 1. Dr. S.Venkatesan, Associate Professor, Department of Information 1. Dr. Savaridassan.P, SRMIST
Community Technology, IIIT Allahabad

216
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE465T CLOUD APPLICATION DEVELOPMENT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: explore different cloud services 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: compare different security aspects in cloud deployment models

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: describe different virtualization techniques in cloud deployment models

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: articulate cloud applications in various platform

Environment &
Sustainability
CLR-5: design real-time cloud applications using cloud services

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: summarize the different cloud services and deployment platforms 3 - - - - - - - - - - - - - 3
CO-2: appraise different cloud security services in deployment models - - 2 - - - - - - - - - - - 3
CO-3: interpret different virtualization platforms - - - - 2 - - - - - - - - - 3
CO-4: categorize different cloud services - - 3 - - - - - - - - - - - 3
CO-5: develop and deploy cloud applications using cloud services - - 3 - - - - - - - - - - - 3

Unit-1 - Cloud Computing Concepts and Services 9 Hour


Introduction to cloud computing – Cloud deployment models – Business drivers for cloud computing – Cloud computing Delivery Models – Cloud computing Services – Challenges of cloud computing – Cloud
infrastructure: Cloud storage and cloud Compute in Amazon – HP Cloud System Matrix – Microsoft Windows Azure – Microsoft Windows Azure services - Google App Engine, cloud platform as a service – Apache
Hadoop, Mashups – CRM as a service – Social Computing Services – Document Services – Scalable Data Storage Techniques – Map Reduce Revisited – Rich Internet Applications.
Unit-2 - Challenges, Security and Managing Cloud 9 Hour
Addressing the cloud challenges – Scaling Computation – Scaling Storage – Multi-Tenancy – Availability – Design cloud security – Cloud security requirements and Best practices – Security Design Patterns-
Security Architecture standards – Managing the cloud – IaaS, PaaS, SaaS – Cloud Scale Management Systems – Open Source Private cloud software – Amazon cloud formation – Windows Azure Active Directory
Unit-3 - Virtualization 9 Hour
Server Virtualization – Hypervisor-based Virtualization – Techniques for Hypervisor – Hardware support for virtualization – VMware virtualization software – XenServer virtual machine monitor – Storage virtualization
– File virtualization – Example – Block virtualization – Examples – Gird Computing – Grid Technologies – Comparing Grid and Cloud – Cloud-related technologies – Creating sample hello world application in Open
Shift Example
Unit-4 - Application Development 9 Hour
Amazon Web Services: EC2 Instances – Connecting Clients to Cloud Instances through Firewalls – Security Rules for Application Layer & Transport Layer protocols in EC2 – How to launch an EC2 Linux Instance
and connect to it – S3 in Java – Manage SQS Services in C# - Install the simple notification service on ubuntu – Example – Creating an EC2 Placement Group –Use MPI – Hadoop Ecosystem – Install Hadoop on
Eclipse on a Windows System – Cloud Based Simulation of a Distributed Trust Algorithm – A cloud service for adaptive data streaming – cloud-based optimal FPGA synthesis

217
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Applications 9 Hour
Cloud Application Design – Design considerations for cloud applications – Reference architectures for cloud applications – Cloud applications design methodologies – Data storage approaches – Web application
framework – Django – RESTful Web API – Cloud Application Development, Design Approaches – Design methodology for IaaS & PaaS model – Image Processing App – Big Data Analytics – Recommendation
systems – Multimedia cloud – Live video streaming app – Streaming protocols – Video Transcoding app

1. Dinkar Sitaram, Geetha Manjunath, Moving To The Cloud: Developing Apps in the New 5. David E.Y. Sarna, “Implementing and Developing Cloud Applications”, CRC Press 2011
World of Cloud Computing, Syngress, 2013. 6. Dan C.Marinescu, “Cloud Computing: Theory and Practice”,Morgan Kaufman,2013
2. Arshdeep Bahga, Vijay Madisetti, “Cloud Computing A Hands-on Approach”, 2014 7. Michael P. McGrath, Understanding PaaS: Unleash the Power of Cloud Computing, O'Reilly
Learning
3. Edward Hughes, John Hiley, Keith Brown, Ian McKenzie Smith, Hughes Electrical and Media,2012, Charles Alexander, Matthew Sadiku, Fundamentals of electrical circuits,
Resources
Electronics Technology, Pearson Education, 12th ed., 2016 McGraw-Hill Education; 5th ed., 2012
4. Scott Adkins, John Belamaric, Vincent Giersch, “OpenStack Cloud Application 8. Richard Rodger, “Beginning Mobile Application Development in the Cloud”, John Wiley &
Development”, Wiley publisher, 2016 Sons Inc., 2012.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Nagaveer, CEO, Campus Corporate Connect, 1. Dr. Srinivasa Rao Bakshi, IITM, Chennai, [email protected] 1. Dr.S.Thenmalar, SRMIST
[email protected]

218
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE466T NETWORK DESIGN AND MANAGEMENT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: grasp knowledge on the types of Networks and the Network Management basics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the Network Management Standards

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: familiarize with the working of Simple Network Management Protocol and its various versions

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: discern on the working of Remote Monitoring Systems

Environment &
Sustainability
CLR-5: deduce on various Network Management Applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire knowledge on networks and network management 2 - - - - - - - - - - - 3 - -
CO-2: interpret Information on various Network Protocols 2 - - 3 - - - - - - - - 3 - -
CO-3: gain knowledge on the working of SNMP protocol and its various applications 2 - - 3 - - - - - - - - 2 - -
CO-4: examine the network management tools and gather information from the network 2 - - 3 - - - - - - - - 2 - -
CO-5: familiarize with the working of various management applications 2 3 - - - - - - - - - - 2 - -

Unit-1 – Introduction to Network Management 9 Hour


Telephone Network Management, Distributed Computing Environment, TCP/IP Based Networks, Communication Protocols and Standards, Protocol Layer and Services, Challenges of IT Managers, Network
Management, Network and System Management, Network Management System Platform, Current status and future of Network Management, Network Management Standards, Network Management Model -
Organizational model, Information Model, Management Information Trees, Communication Model,ASN.1,Terminology, Symbols and Conventions, Functional Model
Unit-2 – Network Protocols 9 Hour
Introduction to SNMP, SNMP v1 model, Organization Model, System overview, SNMP v1 Information model, Structure of Management Information, Managed Objects, MIB-Object Group, System Group, Interfaces
Group, Address Translation group, IP Group, ICMP Group, TCP Group, UDP Group, SNMP, MIB, User-Based Security Model, Access Control
Unit-3 – Network Monitoring Tools 9 Hour
Remote Monitoring, RMON SMI and MIB, RMON1, RMON2, System Utilities for Management Tool, Network Statistics Measurement Systems, Traffic Load, Protocol Statistics, Data and Error Statistics, Network
Management System, Components, Requirements, System Management, Network Management Applications, Configuration Management, Inventory Management, Performance Management Tools
Unit-4 – Configuration Management 9 Hour
Network Management Applications, Fault Management -Architecture, Fault location, Fault isolation Algorithm, Self-healing, avoiding failures, Configuration setting, Configuration discovery and Change Control,
Configuration Management Applications, Patch Management, Approaches for Performance Management, Performance Monitoring and Reporting, Performance trouble shooting, Capacity Planning, Account
Management, Report Management System and User Reports, Policy Management, Service Level Management
Unit-5 - Network Design and Planning 9 Hour
Network Design for Enterprise Network, Network Design Process, Data Collection, Data Generation, Traffic Generators, Cost Generators, Topology, Architecture, Graph, Link, Algorithms, Network Design
Techniques, Performance Analysis, Queuing Essentials, Loss and Delay, Reliability, Network Cost

219
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Greg Tomsho, Ed Tittel, David Johnson, “Guide to Network Essentials”, Eight Edition, 3. Mani Subramanian “Network Management Principles and Practice”, Second Edition,
Learning Cengage Learning, 2019 Pearson Publication, 2012.
Resources 2. Teresa C.Piliouras ,” Network Design Management and Technical Perspectives”, Second 4. Dinesh Chandra Verma, “Principles of Computer Systems and Network Management”,
Edition 2015 Springer, 2009.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 30% - 30% - 30% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Vijay Aravind .S Manager, Accenture, 1. Dr. Zayaraz Godandapani, Professor, Dept. of CSE, Pondicherry 1. Dr.A.Vijay Vasanth, SRMIST
BengaluruEmail:[email protected] Engineering College

220
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

UNDERGRADUATE/ INTEGRATED POST


GRADUATE DEGREE PROGRAMMES
(With exit option of Diploma)

(Choice Based Flexible Credit System)

Regulations 2021

Volume – 11E
(Syllabi for Computer Science and Engineering w/s in
Computer Networking Programme Courses)

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

221
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Core Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

222
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC311J WIRELESS NETWORKS C PROFESSIONAL CORE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: identify the concepts of modulation and transmitters in analog communication 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: relate frequency modulation and amplitude modulation in digital communication

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: transfer knowledge on wireless communication and its parameters

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: relate various wireless network topologies and its operations

Communication
Environment &
Sustainability
CLR-5: appraise the concepts of information on GPRS applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: recognize the concepts of modulation and transmitters in analog communication 3 - 2 - - - - - - - - - - - 3
CO-2: correlate the information on frequency modulation and amplitude modulation in digital communication 3 - - - - - 2 - - - - - - - 3
CO-3: articulate knowledge on wireless communication and its parameters 3 - - - - - 2 - - - - - - - 3
CO-4: devise wireless network topologies and its operations 3 - 2 - - - - - - - - - - - 3
CO-5: defend the concepts of information on GPRS applications 3 - 2 - - - - - - - - - - - 3

Unit-1 - Analog Communication 12 Hour


Introduction to communication system, Need for modulation. - classification- - Amplitude Modulation, Definition, Time domain and frequency domain description, . Square law Modulator, Square law detector,
Envelope detector. Radio Transmitters-Classification of Transmitters.
Unit-2 - Digital Communication 12 Hour
Frequency Modulation: Narrow band FM, Wide band FM, FM Wave -Comparison of FM & AM - Detection of FM Waves: Phase locked loop, Foster Seeley Discriminator.
Unit-3 - Wireless Communication 12 Hour
An Introduction to the Wireless Channel – Noise, Multipath Propagation Large scale path loss – Small scale fading- Parameters of mobile multipath channels – Time dispersion parameters-Coherence bandwidth –
Doppler spread & Coherence time, Classification of fading.
Unit-4 - Wireless Network Planning and Operation 12 Hour
Wireless networks topologies, cellular topology, cell fundamentals signal to interference ratio calculation, capacity expansion techniques, cell splitting, cell sectoring, micro cell method, overload cells, channel
borrowing techniques, DCA, mobility management, radio resources and power management securities in wireless networks.
Unit-5 - Wireless LAN 12 Hour
Mechanism to support a mobile environment, IS-95 CDMA forward channel, IS – 95 GPRS and higher data rates, Historical overviews of the LAN industry, evolution of the WLAN industry, wireless home networking,
IEEE 802.11. The PHY Layer, MAC Layer-Wireless Network Application-Case Study.

223
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Lab Experiments
1. Implement Amplitude modulation and demodulation. 8. Design Global System for Mobile Communication (GSM)
2. Implement Frequency modulation and demodulation. 9. Configuration of simple network with point-to-point link
3. Design TDM and FDM 10. Design Star topology
4. Design PAM and PPM 11. Study of cell splitting and cell sectoring.
5. Implement Propagation Path loss Models (Indoor & Outdoor) 12. Study Token bus protocol and the performance
6. Design Spread Spectrum – DSSS Modulation & Demodulation 13. Study Token ring protocol and the performance.
7.Study CSMA/CD protocol and its performance 14. Study Zigbee and Blue-tooth technologies
15. Study WiFi and LiFi technologies.

1. Rappaport.T.S.”Wireless Communications: Principles and Practice”, 2nd Edition, Pearson, 4. Andrea Goldsmith, “Wireless Communications”, Cambridge University Press, Aug 2005
2011. 5. Schiller, "Mobile Communications", Pearson Education Asia Ltd., Reprint 2012
Learning
2. John D Kraus, Ronald J Marhefka, Ahmed S Khan “Antenna and Wave Propagation”, 4th 6. Lee W.C.Y., " Mobile Communications Engineering: Theory and Applications", McGraw
Resources
Edition, Tata McGraw Hill, 2010 Hill, New York, 2nd Edition, 1998
3. Constantine Balanis. A, “Antenna Theory: Analysis and Design”, 3rd Edition, John Wiley, 2012 7. Andreas.F. Molisch., "Wireless Communications", Wiley, 2nd Edition-2005, Reprint-2014

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 30% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. J Dr.Madan Lakshmanan, Senior Scientist, CEERI, 1. Dr. K.Selvakumar, Professor & Head, Annamalai University, 1. Dr.P.Visalakshi, SRMIST
CSIR, Chennai (R&D Industry) Chidambaram, Tamilnadu, India
2. Mr. Anuj Kumar, Bombardier Transportation, Ahmedabad, 2. Prof. Subra Ganesan. Professor, Electrical and Computer 2. Arun.A, SRMIST
[email protected] Engineering, Oakland University, USA
3. Mr. Hariharasudhan - Johnson Controls, Pune, 3. Dr.M.D. Selvaraj, Professor, Head of the Department, ECE, IITM, 3. Dr.K.Kalimuthu, SRMIST
[email protected] Kancheepuram, Technology, Chennai

224
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC312J MOBILE ADHOC NETWORKS C PROFESSIONAL CORE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the design issues in ad hoc and sensor networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: relate the architecture and protocols of wireless sensor networks

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: categorize the different types of MAC protocols

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: examine the different types of adhoc routing protocols

Communication
Environment &
Sustainability
CLR-5: correlate the QoS issues in adhoc networks

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the use of network devices in data Communication 3 - - - - - - - - - - - - - 3
CO-2: practice various MAC protocols in Adhoc Wireless Networks 3 - - - - - - - 3 - - - - - 3
CO-3: categorize the routing protocols used in Adhoc and Wireless sensor networks - - - - - - - - 3 - - - - - 3
CO-4: relate the transport layer design and network security issues and the various prevention techniques 3 - - - - - - - - - - - - - 3
CO-5: sketch the QoS design in Adhoc and Wireless sensor networks 3 - - - - - - - 3 - - - - - 3

Unit-1 - Introduction to MANET and WSN 12 Hour


Origin of packet radio networks, Components of packet radio networks, Mobile Ad hoc Networks (MANETs) and wireless sensor networks (WSNs): concepts and architectures, Issues in adhoc network, Design
Challenges in Ad hoc and Sensor Networks, Applications of Ad Hoc and Sensor networks.
Unit-2 - MAC Protocol 12 Hour
Ad Hoc Wireless Networks: Introduction, Cellular and Ad Hoc wireless Networks, Ad Hoc Wireless Internet, MAC Protocols for Ad Hoc Wireless, Design Goals of MAC protocol, Classification of MAC Protocols, MAC
Protocols for Wireless Sensor Networks, Schedule based protocols – LEACH, IEEE 802.15.4, BLUETOOTH, ZIGBEE.
Unit-3 - Network Routing Protocol 12 Hour
Design issues, goals, and classification. Proactive Vs reactive routing, Link State Routing Protocol, Distance Vector Multicast Routing Protocol, Overview of hybrid routing protocol, energy aware routing algorithm,
hierarchical routing, QoS aware routing.
Unit-4 - Transport Layer Protocol & Network Security 12 Hour
Issues in designing transport layer protocol, Design goals of a transport layer protocol, Classification of transport layer solutions, TCP over adhoc networks, Security in mobile adhoc network, Network security
requirement, Issues and challenges in security provisioning, Network security attack, Key management, Secure routing in adhoc network.
Unit-5 - Cross Layer Design & Quality of Service 12 Hour
Cross layer Design: Need for cross layer design, Cross layer optimization, Parameter optimization, Cross layer cautionary perspective. Integration of adhoc with Mobile IP networks, Issues, and challenges in
providing QoS in adhoc network, Characteristics of QoS solutions, Qos Model, QoS resource reservation signaling, SWAN.

225
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Lab Experiments
Lab1: Study on Sample wireless topology Lab8: implement multicast routing protocol
Lab2: Design of simple Mobile Ad-hoc networks Lab9: implement QoS aware routing protocol
Lab3: Create simple sensor networks using NS-2 Lab10: Implement transport layer protocol
Lab4: Study on various MAC protocols, Lab11: Implement TCP, Other transport layer protocols
Lab5: Implement LEACH protocol, Lab12: Study on User Datagram Protocol
Lab6: Implement ZIGBEE, RFID protocol. Lab13: Implement cross layer optimization
Lab7: Implement unicast routing protocol Lab14: Study on integration of adhoc with Mobile IP network
Lab15: Implement QoS model in MAC layer

1. C. Siva Ram Murthy, and B. S. Manoj, “Ad Hoc Wireless Networks: Architectures and 3. Kazem Sohraby, Daniel Minoli, &TaiebZnati, “Wireless Sensor Networks Technology,
Protocols “, Prentice Hall Professional Technical Reference, 2008. Protocols, and Applications”, John Wiley, 2007.
Learning
2. Dargie, Waltenegus, and Christian Poellabauer. Fundamentals of wireless sensor 4. Anna Hac, “Wireless Sensor Network Designs”, John Wiley, I Edition, 2003.
Resources
networks: theory and practice. John Wiley & Sons, 2010. 5. Savo G. Glisic, “Advanced Wireless Networks: Technology and Business Models”, John Wiley,
I Edition, 2016

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 25% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. J. Aravind Kumar, Senior Architect, JDA Solutions, 1. Dr. K. Selvakumar, Professor & Head, Annamalai University, 1. Dr.N. Krishnaraj, SRMIST
Bangalore Chidambaram, Tamilnadu, India
2. Dr.R. Lenin Babu, Conversight.Ai, Indiana, 2. Dr. K. G. Srinivasa, Professor, Department of Data Science and 2. Dr. Praveena Akki, SRMIST
United States of America Artificial Intelligence, IIIT- Naya Raipur, Raipur, Chhattisgarh, India

226
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Elective Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

227
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE273T DISTRIBUTED OPERATING SYSTEMS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: recognize the essential concepts of distributed system 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: relate the communication systems that takes place in Distributed systems

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: discover the necessity of synchronization, consistency, and Fault tolerance in a Distributed System

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: categorize different processors and process management approaches

Environment &
Sustainability
CLR-5: use distributed shared memory schemes to access data in the distributed systems

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: characterize the fundamental hardware and software concepts of distributed systems 2 - 3 - - - - - - - - - 3 - 3
CO-2: categorize layered protocols and comprehend the communications in distributed systems 2 - 3 - 2 - - - - - - - 3 - 3
CO-3: implement synchronization of distributed systems using various algorithms 2 - 3 - - - - - - - - - 3 - 3
CO-4: demonstrate process scheduling and fault tolerance of distributed systems 2 - 3 - 2 - - - - - - - 3 - 3
CO-5: illustrate the concepts of distributed shared memory systems 2 - 3 - - - - - - - - - 3 - 3

Unit-1 - Introduction to Distributed System 9 Hour


Distributed Systems- Goals of Distributed Systems, Hardware Concepts- Bus-based Multiprocessors- Switched Multiprocessors, - Bus-based Multicomputers- Switched Multicomputers, Software Concepts-Network
Operating System - True Distributed Systems- Multiprocessors- Time Sharing Systems- Design Issues-Distributed Systems. Case Study: Mach OS System Architecture
Unit-2 - Fundamentals of Communication systems 9 Hour
Layered Protocols, ATM networks, Client Server model - Blocking Primitives, Non-Blocking Primitives, Buffered Primitives, Unbuffered Primitives, Reliable primitives, Unreliable primitives, Message passing and its
related issues, Remote Procedure Call and its related issues, Case Studies: Communication in Mach OS.
Unit-3 - Synchronization in Distributed Systems 9 Hour
Fundamentals of Clock Synchronization, Logical clock, Physical clock, Algorithms for Clock synchronization, Mutual Exclusion-Centralized Algorithm, Distributed Algorithm, Token Ring Algorithm, Comparison of all
three algorithms, Importance of Election Algorithm, Bully Algorithm, Ring Algorithm, Atomic Transaction- Introduction Transaction Model, Concurrency Control, Deadlock in Distributed Systems, Distributed Deadlock
Detection. Synchronization in Mach OS.
Unit-4 - Processes and Processors in Distributed Operating Systems 9 Hour
Threads, Design issues of Threads package, Workstation Model, System Model – Introduction, Using Idle Workstations, Processor Pool Model, Hybrid Model, Processor Allocation – Allocation Model, Design issues
for processor Allocation Algorithms, Example of processor Allocation Algorithms, Scheduling in Distributed Systems, Load Balancing and Sharing Approach, Fault Tolerance- Fault tolerance Using Active Replication,
Primary-backup, Real Time Distributed Systems- Communication, Real Time Scheduling. Case study - Process Management in Mach OS
Unit-5 - Distributed Shared memory 9 Hour
Introduction, Bus-Based Multiprocessors, Switched Multiprocessors, Ring-based Multiprocessors, Numa Multiprocessors, Consistency Models – Strict Consistency, Casual Consistency, PRAM Consistency, Weak
Consistency, Release Consistency, Entry Consistency, Page Based Distributed Shared Memory – Replication, granularity, Finding the Owner, Finding the Copies, Page Replacement, Synchronization, Shared –
Variable Distributed Shared memory, Object Based Distributed Shared memory, Case Study – Memory Management in Mach OS
228
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Andrew S. Tanenbaum, Distributed Operating Systems, Pearson Education, 3. Mukesh Singhal, Niranjan G Shivratri, Advanced concepts in Operating Systems, Mc Graw Hill
Learning 2011. International, 2017.
Resources 2. Pradeep K. Sinha, Distributed Operating Systems Concepts and Design, PHI, 4. Erciyes, Kayhan, Distributed real-time systems: theory and practice, Springer, 2019.
2012. 5. http://www.cs.iit.edu/~sun/cs550.html 5.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Uma Parvathy S, Associate Consultant TCS. 1. Dr. S. Geetha, Assistant Professor, Pondicherry University, 1. Dr. K. Deepa Thilak, SRMIST
[email protected] [email protected]

229
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE274T PERVASIVE COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understanding the basics of pervasive computing and its application 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: categorize the fundamental elements of pervasive computing

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: connect voice enabling technology with pervasive computing

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: relate the design process Human–Computer Interface

Environment &
Sustainability
CLR-5: illustrate Pervasive Mobile Transaction

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the fundamental elements of pervasive computing and its solutions 2 - - - - - - - - - - - - - -
CO-2: relate hardware, software and implementing security aspects involved in pervasive computing 3 - - - - - - - - - - - - - -
CO-3: voice Technology connection in Pervasive Computing 3 - - - - - - - - - - - - 3 -
CO-4: discover the functionalities and components of Human–Computer Interface 2 - - - - - - - - - - - - 3 -
CO-5: demonstrate about Pervasive Mobile Transaction 3 - - - - - - - - - - - - 3 -

Unit-1 - Pervasive Computing 9 Hour


Past, Present and Future Pervasive computing, Pervasive Computing Market, m-Business, Application examples: Retail, Application examples: Airline check-in and booking, Healthcare, Tracking, Car information
system, Sales Force Automation, Email access via WAP and voice, A Pervasive System for Volcano Monitoring, A Pervasive Computing Platform for Individualized Higher Education, Device Technology, Hardware,
Human machine interface, Biometrics, Operating systems, Java for pervasive devices
Unit-2 - Device Connectivity 9 Hour
Protocols, Security, Device management, WAP and beyond: Components of the WAP architecture, WAP infrastructure, WAP security issues, Wireless Markup language, WAP Push, Products
Unit-3 - Voice Technology 9 Hour
Basic of speech recognition, Voice Standard, Speech application, Speech and pervasive computing, Security, Personal digital assistants: Device categories, Personal digital assistant operating systems, Device
characteristics, Software components Standards Mobile application Personal digital assistant browser
Unit-4 - Human–Computer Interface (HCI) in Pervasive Environments 9 Hour
HCI interface in Pervasive Environments: HCI Service and Interaction Migration, Context- Driven HCI Service Selection, Scenario Study: Video Calls at a Smart Office, A Web Service– Based HCI Migration
Framework
Unit-5 - Pervasive Mobile Transaction 9 Hour
Mobile Transaction Framework, Context-Aware Pervasive Transaction Model, Dynamic Transaction Management, Formal Transaction Verification, Evaluations. Case Studies: iCampus Prototype, IPSpace: An IPv6-
Enabled Intelligent Space.

230
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. JochenBurkhardt, Horst Henn, Stefan Hepper, Thomas Schaech & Klaus Rindtorff, 3. Gupta, Deepak, and Aditya Khamparia, eds. Fog, Edge, and Pervasive Computing in
―Pervasive Computing, Technology and Architecture of Mobile Internet Applicationsǁ, Intelligent IoT Driven Applications. John Wiley & Sons, 2020.
Learning
Pearson Education, 2012.ISBN-13: 978-0201722154, 2012 4. Bhargava, Deepshikha & Vyas, Dr Sonali. (2019). Pervasive Computing: A Networking
Resources
2. S. Poslad, ―Ubiquitous Computing: Smart Devices, Environments, and Interactions, ǁ Wiley, Perspective and Future Directions. 10.1007/978-981-13-3462-7.
2009

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Charan Ramaswamy Senior Administrator, Wipro 1. Dr. N.Kumaratharan Professor, Electronics & Communication Engineering Sri Venkateswara 1. Dr. Rajaram V, SRM IST
Technologies Australia Pty Ltd College of Engineering Pennalur, Sriperumbudur - 602 117 Tamil Nadu, INDIA.

231
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE347T NETWORK PROTOCOLS AND PROGRAMMING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: describe the importance of various network and transport layer protocols 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: demonstrate the basics of different socket programming concepts and functions

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: examination of application layer protocols and Multicasting protocols with its characteristics

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: summarizes the latest IPV6 technology and addressing schemes

Environment &
Sustainability
CLR-5: appraise the WAN protocols and MPLS protocols

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: determining the basics of different types of network and transport layer protocols - - 2 - 3 - - - - 3 - - - - 3
experimenting network connections through socket programming and summarizing application layer
CO-2: - - 2 - 3 - - - - 3 - - - - 3
protocols
CO-3: demonstrate the Application layer protocols, Multicasting Protocols and its characteristics - - 2 - 3 - - - - - - - - - 3
CO-4: experimenting the latest IPV6 address in real time - - - - 3 - - - - - - - - - 3
CO-5: categorizing WAN Protocols with MPLS technology - - 2 - 3 - - - - - - - - - 3

Unit-1 - Network and Transport Layer Protocols 9 Hour


OSI Model, IP Header, ARP, RARP, ICMP, UDP Data gram and its characteristics, TCP Header & Connection Establishment Process, IP Fragmentation, ARP, RARP, ICMP, UDP Data gram and its characteristics,
TCP Header & Connection Establishment Process
Unit-2 - Socket Programming 9 Hour
Byte Ordering Conversion Functions, man page, System Calls used with sockets, Iterative and Concurrent Server, Socket Interface, Remote Procedure Call, TCP Client Server Program, UDP Client Server Program
Unit-3 - Application Layer Protocols 9 Hour
DNS, TELNET, FTP, HTTP, WWW, DHCP, SMTP, POP3 Multicasting Protocols BGMP, IGMP, MBGP, MOSPF, PGM, PIM-DM PIM-SM
Unit-4 - Ipv6 Protocol 9 Hour
IPV6 Features, IPv6 Header, IPv6 Address Types, IPv6 Routing Protocols, IPv4 to IPv6 Tunneling and Translation Techniques
Unit-5 - WAN Protocols 9 Hour
DSL and Cable technology, Frame Relay, ATM, PPP, HDLC, MPLS, CR-LDP, LDP, RSVP-TE

232
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Forouzan, Behrouz A. TCP/IP protocol suite. McGraw-Hill Higher 4. Dong, Jielin. "Network Protocol Handbook." (2007).
Education, 2002. 5. https://people.scs.carleton.ca/~lanthier/teaching/COMP1406/Notes/COMP1406_Ch12_NetworkProgramming.pdf
2. Beej’s Guide to Network Programming Using Internet Sockets Brian “Beej 6. https://www.geeksforgeeks.org/types-of-network-protocols-and-their-uses/
Learning
Jorgensen” Hall v3.1.9, Copyright © November 16, 2022. 7. https://internalpointers.com/post/network-programming-beginners-overview
Resources
3. Stevens, W. Richard, Andrew M. Rudoff, and Bill Fenner. Unix network 8. https://people.scs.carleton.ca/~lanthier/teaching/COMP1406/Notes/COMP1406_Ch12_NetworkProgramming.pdf
programming volume 1: the sockets networking API. Vol. 3. Boston: .
Addison-Wesley Professional, 2003.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.S.Venkata prasad, TCS, chennai- 1. Dr. T Veera kumar, NIT, [email protected] 1. Dr S Murugaanandam, SRMIST
[email protected].
2. Mr. J. Hariprasam, HCL Technologies, 2. Dr. Bhavana Rudhra, NIT, [email protected]
[email protected]

233
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE348T NETWORK ROUTING ALGORITHMS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basics about Routing in Networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: relate the categories of Routing Algorithms

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: explore the Routing Protocols

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: explore the Distance Vector Routing Family

Environment &
Sustainability
CLR-5: explore the Router Architecture and Design

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify and define Network categories and corresponding Routing Schema - - 3 - - - - - - - - - - - 3
CO-2: examine the categories of Routing Algorithms - - 2 - - - - - - - - - - - 3
CO-3: analyze the Routing Protocols - - 2 - 3 - - - - - - - - - 3
CO-4: analyze the Distance Vector Routing Family - - 2 - - - - - - - - - - - 3
CO-5: analyze the Router Architecture and Design - - 2 - 2 - - - - - - - - - 3

Unit-1 - Routing Foundations 9 Hour


Introduction to Networking and Network Routing - IPV4 Addressing, Protocol Stack Architecture - Router Architecture - Network Topology Architecture - Network Management Architecture - Global Telephone
Network - Communication Technologies - Standards Committees.
Unit-2 - Routing Algorithms: Shortest Path, Widest Path, and Spanning Tree 9 Hour
Bellman–Ford Algorithm: Centralized View - A Distance Vector Approach: Distributed View – Dijkstra’s Algorithm: Centralized Approach – Dijkstra’s Algorithm: Distributed Approach – Widest Path Algorithm: Dijkstra-
Based Approach - Widest Path Algorithm: Distance Vector-Based Approach – Spanning Tree: Breadth First Search and Depth First Search - Minimum Spanning Tree - Steiner Tree Algorithms - k-Shortest Paths
Algorithm
Unit-3 - Routing Protocols: Framework and Principles 9 Hour
Routing Protocol, Routing Algorithm, and Routing Table – Routing Information Representation and Protocol Messages – Distance Vector Routing Protocol: Illustration – Distance Vector Routing Protocol: Times –
Babel Routing Protocol – Link State Protocol: In-Band Hop-by-Hop Dissemination – Link State Protocol: In-Band Based on End-to-End Session – Path Vector Routing Protocol - Link Cost
Unit-4 - IP Routing and Distance Vector Protocol Family 9 Hour
Routers, Networks, and Routing Information – Routing Table – Communication of Routing Information – Static Routes – Routing Information Protocol, Version 1 (RIPv1) : Communication and Message Format–
RIPv1 General Operation – Routing Information Protocol, Version 2 (RIPv2) - Interior Gateway Routing Protocol (IGRP) - Enhanced Interior Gateway Routing Protocol (EIGRP)
Unit-5 - Router Architecture and Design 9 Hour
Router Architectures – Functions of a Router - Types of Routers – Elements of a Router – Packet Flow – Packet Processing: Fast Path Versus Slow Path - Router Architectures, Impact of Addressing on Lookup -
Longest Prefix Matching

234
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Deepankar Medhi, Karthik Ramasamy, Network Routing Algorithms, Protocols, and 3. Yoram Orzach, Deepanshu Khanna, Network Protocols for Security Professionals, Packt
Learning
Architectures Morgan Kaufmann Publishers, Second Edition, 2017. Publishers, First Edition, 2022.
Resources
2. James Aweya, IP Routing Protocols, CRC Press, First Edition, 2021. 4. James H. Baxter, Wireshark Essentials, Packt Publishers, First Edition, 2017

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.R.Lenin Babu, Conversight.Ai, USA, 1. Dr.K.Selvakumar, Professor, Annamalai University, 1. Dr.C. Rajesh Babu, SRMIST
[email protected] [email protected]
2. Mr.U.Aravind Kumar, JPA Solutions, Bangalore, 2. Dr.K.G.Srinivasa, Professor, NITTR Chandigarh,
[email protected] [email protected]

235
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE349T OPTICAL NETWORKS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand a basic foundation of Optical Networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: relate the details about propagation and Dispersion of light

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: correlate the different Components of Optical Networks

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: analyze the Optical Network

Environment &
Sustainability
CLR-5: appraise about the Optical Network Management Techniques

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the basic knowledge Multiplexing and Fiber characteristics - - - - 2 - - - - - - - 3 - -
CO-2: illustrate the effects of Light energy - - - - 2 - - - - - - - 3 - -
CO-3: categorize the Various Components of Optical Networks - - - - 3 - - - - - - - 3 - -
CO-4: articulate about SONET and WDM - - - - 3 - - - - - - - 3 - -
CO-5: appraise the Network management functions and Access Networks - - - - 3 - - - - - - - 3 - -

Unit-1 - Introduction to Optical Networks 9 Hour


Introduction: Network Architecture - Services, Circuit Switching, Packet Switching - First- and second-generation optical networks – Optical Layer - Transmission basics: Wavelength, Frequencies, Channel Spacing
- Network evolution: Single Mode Fiber, Multi-Mode Fiber.
Unit-2 - Propagation of Light 9 Hour
Propagation of light energy in optical fibers: Loss and Bandwidth windows – Intermodal dispersion: Geometrical Optics Approach, Bit Rate–Distance Limitation - Chromatic dispersion: Chirped Gaussian Pulses,
Controlling the Dispersion - nonlinear effects: Stimulated Brillouin Scattering, Stimulated Raman Scattering, Self-Phase Modulation, Cross-Phase Modulation
Unit-3 - Network Components 9 Hour
Couplers, Isolators and Circulators, Multiplexers and Filters: Fiber gratings – Fabry Perot Filters – MZ interferometers – Arrayed waveguide grating – optical amplifiers: SOA, EDFA and Raman Amplifier – switches.
Unit-4 - Optical Networks 9 Hour
SONET/ SDH, Architecture of Optical transport networks (OTNs), Generic Framing Procedure, Optical Transport Network, Ethernet, IP, Multiprotocol Label Switching, Resilient Packet Ring, Storage-Area Networks
-WDM: Terminals, Amplifiers, Multiplexers, Cross connects
Unit-5 - Network Management 9 Hour
Network Management functions: Management Framework, Information Model, Management Protocols - Optical Layer services and Interfacing - Performance and fault management - Configuration Management -
optical safety

236
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Partha Parthim Sahu, " Fundamentals of Optical Networks and Components" CRC 3. Uyless Black, “Optical Networks – Third generation transport systems”, 1 st edition, Pearson,
Learning Publications, 2020 2002
Resources 2. Rajiv Ramaswamy, Kumar N. Sivaranjan and Galen H. Sasaki, "Optical Networks – A 4. C. Siva Ram Murthy and Mohan Gurusamy, “WDM Optical Networks: Concepts Design,
practical perspective", 3 rd edition, Elsevier, 2010 and Algorithms”, PHI, EEE, 2001

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.M.Vivekanandan,Nokia 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Ms.G.Parimala, SRMIST
2. Mr.Santhosh Kumar,CTS 2. Dr.Syedthouheed,Reva University, Bangalore 2. Dr.S.Thanga Revathi, SRMIST

237
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE350T PRINCIPLES OF CLOUD COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
understand the fundamental ideas behind Cloud Computing, the evolution of the paradigm, its Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
applicability; benefits, as well as current and future challenges

Environment & Sustainability


CLR-2: articulate cloud enabling technologies and get exposure to advanced clouds

The engineer and society


Conduct investigations of
correlate cloud storage technologies and relevant distributed file systems, NoSQL databases and object

Individual & Team Work


Engineering Knowledge
CLR-3:

Design/development of

Project Mgt. & Finance


storage

Modern Tool Usage

Life Long Learning


complex problems
CLR-4: appraise the cloud security threats and protective mechanism for cloud computing

Problem Analysis

Communication
participate in team-based peer reviews to analyze the security development life cycle and mitigate risks
CLR-5:
and vulnerabilities

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: explain the fundamentals of cloud computing and its applications, benefits, and Challenges 3 - - - - - - - - - - - - - -
apply fundamental concepts in cloud infrastructures to understand the cloud system, network and
CO-2: - - - 2 - - - - - - - - 3 - -
virtualization and outline their role in enabling the cloud computing system model
CO-3: analyze the fundamental concepts of cloud storage and demonstrate their use in storage systems - - - - 2 - - - - - - - 3 - -
appraise the security issues related to cloud computing and handle the security threats and construct
CO-4: - - - 2 - - - - - - - - 3 - -
different cloud delivery design models
CO-5: analyze various cloud programming models and apply them to solve problems on the cloud - - - 2 - - - - - - - 3 - -

Unit-1 - Introduction to Cloud Computing 9 Hour


Introduction - Evolution of cloud computing- Network-Centric Computing - Network-Centric Content -Origin of Cloud Computing -Basic Concepts and Terminology - Goals and Benefits - Risks and Challenges -Roles
and Boundaries - Cloud Characteristics - Cloud Deployment Models - Cloud Service Models - Cloud Service Providers and the Cloud Ecosystem -SLA Management in Cloud Computing: A Service Providers
Perspective.
Unit-2 - Cloud Technologies 9 Hour
Cloud enabling technologies-Broadband networks and Internet architecture - Data Center Technology - Web Technology - Multitenant Technology - Service Technology -Virtualization Technology - Virtual Machines
- Full Virtualization and Para-virtualization - Hardware Support for Virtualization - Kernel-Based Virtual Machine - Hypervisors.
Unit-3 - Cloud Data Storage 9 Hour
Introduction to Cloud Data Storage - The evaluation of storage technology - Storage Models - File Systems and databases - Cloud Object Storage (Amazon S3) - Data Storage for Online Transaction Processing
Systems - Disk Locality versus Data Locality in Computer Clouds.
Unit-4 - Cloud Security 9 Hour
Fundamental Cloud Security - Basic Terms and Concepts - Threat Agents, Cloud Security Threats - Cloud Security Mechanisms - Encryption – Hashing - Digital Signature - Public Key Infrastructure - Identity and
Access Management - Single Sign-On: Kerberos authentication - One-time password, Basic cloud data - security mechanisms - Virtual Machine Security - Security of Virtualization - A Trusted Hypervisor - Mobile
Devices and Cloud Security.

238
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Cloud Application Development 9 Hour
Cloud Application Development and Architectural Styles - MapReduce Programming Model - Case Study: The Grep The Web Application - Hadoop: Yarn and Tez - SQL on Hadoop: Pig, Hive, and Impala - Current
Cloud Applications and New Opportunities - Design approaches with Case Study - Design methodology for IaaS Service Model - Google API, More on AWS EC2 Instances.

1. Dan C. Marinescu, “Cloud Computing Theory and Practiceǁ, Second Edition” Elsevier Inc. 2018 4. K. Chandrasekaran, "Essentials of Cloud Computing", Chapman and Hall/CRC Press,
2. Rajkumar Buyya, James Broberg, AndrzejGoscinski, “Cloud Computing Principles and 2014, ISBN 9781482205435
Learning Paradigms”, Wiley Publications, 2017. 5. Arshdeep Bahga, Vijay Madisetti, "Cloud Computing: A Hands-On Approach", University
Resources 3. Thomas Erl, ZaighamMahmood, and RichardoPuttini, "Cloud Computing: Concepts, Press, 2016, ISBN13: 978-0996025508.
Technology & Architecture", Prentice Hall/PearsonPTR, Fourth Printing, 2014, ISBN:
978013338752.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. SuriyadeepanRamamoorthy Research Engineer at Saama Technology 1. Dr.E. Ilavarasan Professor, CSE Pondicherry 1. Dr. Manickam.M, SRMIST
Puducherry, Puducherry, India Information Technology and Services. Engineering College.
2. Ms.V.Lavanya, SRMIST

239
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE450T NETWORK SECURITY E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic concepts of networking devices 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: appraise knowledge on the working of IP security

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: categorize various methods and protocols to maintain E-mail security

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: validate the knowledge on the various methods and protocols to maintain web security

Environment &
Sustainability
CLR-5: assess various security measures for wireless and cell phone Communications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the knowledge of network devices used in data Communication - 2 - - - - - - - - - - - - 3
CO-2: examine the working of IP security and acquire the ability to identify IP security attack - - - - 3 - - - - - - - - - 3
CO-3: appraise Email security and use the knowledge to detect the attacks in e-mail - 3 - - - - - 1 - - - - - - 3
CO-4: grade the knowledge to prevent against Web security attack - - - - 3 - - - - - - - - - 3
CO-5: assess wireless network security issues and the various prevention techniques - - - - 3 - - - - - - - - - 3

Unit-1 – Introduction to Network Security 9 Hour


Networking Devices (Layer1,2), Networking Devices (Layer 3), Different types of network layer attacks, Firewall- ACL, Packet Filtering, DMZ, Alerts, Audit Trials, IDS, Advantages and Disadvantages of IDS (Need
of IPS), Advantages of IPS over IDS, IPS, IPS Types- Signature based, Anomaly based, Policy based, IPS Types - Honey pot based, Applications, Malicious Software
Unit-2 - Overview of IPSEC 9 Hour
Security Associations, Security Policy databases, AH and ESP, Tunnel and Transport mode, IP header Protection, IP and IPv6, IPV4 and IPV6 header, Authentication Header, Mutable, Immutable and Mutable but
predictable, Encapsulation Security Payload (ESP), Internet Key Exchange, Phases of IKE, Phase I IKE- Modes and key types, Phase I IKE Protocols, Phase II IKE, ISAKMP/IKE Encoding
Unit-3 - Security Services 9 Hour
Security Services for E-mail, Establishing keys, Establishing Public and secret keys, Privacy, End-to end Privacy, Privacy with distribution List Exploders, Authentication of the source, Based on public key technology
and secret keys and with distribution list, Message Integrity, Non-repudiation, Introduction and Overview of PGP, Efficient Encoding, Certificate and key revocation, Signature types, Private key, Anomalies, Object
Format,S/MIME
Unit-4 – Transport Layer Security 9 Hour
SSL/TLS Basic Protocol, computing the keys, client authentication, PKI as deployed by SSL, SSL Attacks fixed in v3, Exportability, Encoding, Encrypted Record, Handshake messages, Change cipher spec and
Alerts, SET
Unit-5 – Application Layer Security 9 Hour
Wireless Security: IEEE 802.11 Wireless LAN, Authentication, Authentication and Confidentiality, Cellphone Security,GSM(2G)Security,Security in UMTS(3G),Wireless LAN Vulnerabilities, Phishing, Buffer
Overflow,Format String Attacks,Cross-site Scripting (XSS),SQL Injection,Case Studies:Secure Inter-branch Payment Transactions,Virtual Elections

240
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. William Stallings, “Cryptography and Network Security - Principles and Practice”, 8th 3. Charlie Kaufman, Radia Perlman, Mike Speciner, “Network Security, Prentice Hall of India”, 2nd
Learning edition, Pearson Publication, 2017 edition, 2002.
Resources 2. Bernard Meneze, “Network Security and Cryptography”, Cengage Learning, 2nd 4. Atul Kahate,” Cryptography and network security”, Tata McGraw-Hill Education,4th edition,2019
edition,2012

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.M.Vivekanandan,Nokia 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Ms.D.Saveetha, SRMIST
2. Mr.Santhosh Kumar,CTS 2. Dr.Syedthouheed,Reva University, Bangalore

241
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE466T NETWORK DESIGN AND MANAGEMENT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: grasp knowledge on the types of Networks and the Network Management basics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the Network Management Standards

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: familiarize with the working of Simple Network Management Protocol and its various versions

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: discern on the working of Remote Monitoring Systems

Environment &
Sustainability
CLR-5: deduce on various Network Management Applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire knowledge on networks and network management 2 - - - - - - - - - - - 3 - -
CO-2: interpret Information on various Network Protocols 2 - - 3 - - - - - - - - 3 - -
CO-3: gain knowledge on the working of SNMP protocol and its various applications 2 - - 3 - - - - - - - - 2 - -
CO-4: examine the network management tools and gather information from the network 2 - - 3 - - - - - - - - 2 - -
CO-5: familiarize with the working of various management applications 2 3 - - - - - - - - - - 2 - -

Unit-1 – Telecommunication Network Management 9 Hour


Telephone Network Management, Distributed Computing Environment, TCP/IP Based Networks, Communication Protocols and Standards, Protocol Layer and Services, Challenges of IT Managers, Network
Management, Network and System Management, Network Management System Platform, Current status and future of Network Management, Network Management Standards, Network Management Model -
Organizational model, Information Model, Management Information Trees, Communication Model, ASN.1,Terminology, Symbols and Conventions, Functional Model
Unit-2 – Network Management Protocol 9 Hour
Introduction to SNMP, SNMP v1 model, Organization Model, System overview, SNMP v1 Information model, Structure of Management Information, Managed Objects, MIB-Object Group, System Group, Interfaces
Group, Address Translation group, IP Group, ICMP Group, TCP Group, UDP Group, SNMP, MIB, User-Based Security Model, Access Control
Unit-3 – Remote Monitoring Protocol 9 Hour
Remote Monitoring, RMON SMI and MIB, RMON1, RMON2, System Utilities for Management Tool, Network Statistics Measurement Systems, Traffic Load, Protocol Statistics, Data and Error Statistics, Network
Management System, Components, Requirements, System Management, Network Management Applications, Configuration Management, Inventory Management, Performance Management Tools
Unit-4 – Network Management and Application Protocol 9 Hour
Network Management Applications, Fault Management -Architecture, Fault location, Fault isolation Algorithm, Self-healing, avoiding failures, Configuration setting, Configuration discovery and Change Control,
Configuration Management Applications, Patch Management, Approaches for Performance Management, Performance Monitoring and Reporting, Performance trouble shooting, Capacity Planning, Account
Management, Report Management System and User Reports, Policy Management, Service Level Management
Unit-5 - Network Design and Planning 9 Hour
Network Design for Enterprise Network, Network Design Process, Data Collection, Data Generation, Traffic Generators, Cost Generators, Topology, Architecture, Graph, Link, Algorithms, Network Design
Techniques, Performance Analysis, Queuing Essentials, Loss and Delay, Reliability, Network Cost

242
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Greg Tomsho, Ed Tittel, David Johnson, “Guide to Network Essentials”, Eight Edition, 3. Mani Subramanian “Network Management Principles and Practice”, Second Edition, Pearson
Learning Cengage Learning, 2019 Publication, 2012.
Resources 2. Teresa C.Piliouras , ”Network Design Management and Technical Perspectives”, 4. Dinesh Chandra Verma, “Principles of Computer Systems and Network Management”, Springer,
Second Edition 2015 2009.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 30% - 30% - 30% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Vijay Aravind .S Manager, Accenture, 1. Dr. ZayarazGodandapani Professor, Dept. of CSE, Pondicherry 1. Dr. A. Vijay Vasanth, SRMIST
BengaluruEmail:[email protected] Engineering College

243
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

UNDERGRADUATE/ INTEGRATED POST


GRADUATE DEGREE PROGRAMMES
(With exit option of Diploma)

(Choice Based Flexible Credit System)

Regulations 2021

Volume – 11F
(Syllabi for Computer Science and Engineering w/s in
Cybersecurity Programme Courses)

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

244
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Core Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

245
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC308T SECURITY RISK MANAGEMENT PRINCIPLES C PROFESSIONAL CORE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the fundamental knowledge about Security Risk 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the various analysis on Security Risk Management

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the demand for IS Audit

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the IT audit and its activities

Environment &
Sustainability
CLR-5: understand the techniques for implementing security in audit

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the knowledge on the fundamentals of Risk management - 3 - - - - - - - - - 2 - - -
CO-2: acquire the ability to apply various techniques for data collection - - - - - - - - - - - 2 - - -
CO-3: utilize the principles of data analysis - 3 - - - - - - - - - - - - 3
CO-4: acquire the ability to apply IS audit - 3 - - - - - - - - - 2 - - 3
CO-5: apply the knowledge gained on auditing methodologies - 3 - - - - - - - - - - - - 3

Unit-1 – Introduction to Risk 9 Hour


Introduction to Risk, Elements of risk, Information Security Risk Management Overview, Information Risk Management Activities, Risk Management and the Security Program, Drivers, Laws, Regulations, Threat
Source Leveraging a Vulnerability, Federal Information Security Management Act of 2002 (FISMA), Gramm-Leach-Bliley Act (GLBA), Health Insurance Portability and Accountability Act (HIPAA), ISO 27001, ISO
27005, Risk Management Frame work, Practical Approach.
Unit-2 – Data Collection and Planning 9 Hour
Introduction to data collection, Planning – the essential element, The Sponsors, Characteristics of a good project sponsor, the project team, Factors that decide upon the size of the project team, Data collection
mechanisms, Collectors and Containers, Executive interviews, Questionnaire, Document requests, List of documents for the assessor, IT Assets inventory, Asset Scoping, Asset Scoping – Requirements, Techniques
involved in asset scoping, Profile survey, Control survey
Unit-3 – Data Analysis 9 Hour
Introduction to data analysis, Compiling Observations, Compiling Observations from Organizational Risk Documents, Format to collect your observations. List of the documents to encounter, Threat Catalog, List of
threat catalogs that can be used as references, Sample Threat Catalog, Vulnerability Catalog, Vulnerability Catalog types, Documentation process, Threat Vulnerability Pairs, Sample Threat and Vulnerability Pairs,
Confidentiality, Confidentiality Determination Matrix, Analyzing Confidentiality Determination Matrix, Developing Sample Confidentiality Determination Matrix.
Unit-4 – Information Security Audit 9 Hour
Demand for IS audit, Auditor Role, Auditee Role, Process of auditing information system, Preplanning the audit, Audit process Perform audit, Hierarchy of internal controls, gathering audit evidence, conducting audit
evidence, Reporting audit evidence, Strategy planning for organizational control, Issues register, Risk management tools, Distinct types of risk tools, Planning Performance

246
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Information Security Audit Analysis 9 Hour
Detailing Information Security Audit, Purpose of IS Audit, Expectation from IS Auditor, Steps to Conduct IS Audit, Classification of Audit, Traditional Audit, Difference Between Audit and Assessment, Relationship
Between Auditor, Auditee and Client; Their Duties, SLA Introduction, SLA Components, Auditing Firm Organizational Chart, Auditing Firm functionalities, Policy Vs Procedures Standard Vs Guideline, Basic Types
of Measurement Metrics, Members of Auditing Committee, Skills Matrix, Example, Audit Evidence, Examples, Direct and Indirect Evidence.

Learning 1. Evan Wheeler, “Security Risk Management”, Syngress ISBN: 97815, 2011 3. David L. Cannon, “CISA Certified Information Systems Auditor Study Guide”, John Wiley & Sons,
Resources 2. Bruce Newsome, “A Practical Introduction to Security and Risk Management”, 2013 ISBN: 978-0-470-23152-4, 2009.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Arun.A, SRMIST

247
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC310J MALWARE ANALYSIS C PROFESSIONAL CORE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the fundamentals of static and dynamic analysis 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: gain knowledge about running malware in virtual environment

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: study about disassembly constructs and its structures

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: study about new processors and file types using the IDA SDK

Environment &
Sustainability
CLR-5: explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain knowledge about the different forms of malware - 2 - - - - 2 - - 3 - 3 - - -
CO-2: set up a safe virtual environment to analyze malware - 2 - - - - - - - - - 3 - - 3
CO-3: navigate, comment, and modify disassembly - 2 - - - - - - - 3 - - - - 3
CO-4: use code graphing to quickly make sense of cross references and function calls - - - - - - 2 - - - - 3 - - 3
CO-5: use debugger to tackle hostile and obfuscated code - - - - - - 2 - - 3 - - - - -

Unit-1 - Introduction to Malware 12 Hour


What is Malware Analysis? -Why Malware Analysis? -Types of Malware Analysis-Basic Static Analysis- Determining the File Type- Fingerprinting Malware- Anti-Virus Scanning- Extracting Strings- Determining File
Obfuscation- Inspecting PE Header Information- Comparing and Classifying Malware- Lab: Setting up and configuring Windows and Linux VM.
Unit-2 - Dynamic Analysis 12 Hour
System and Network Monitoring- Process Inspection with Process Hacker- System Interaction with Process Monitor- Logging system using Noriben- Capture Network Traffic with Wire shark- Simulating services
with INetSim- Analyzing Malware Executable- Analyzing DLL using runll32.exe- Lab: Perform dynamic analysis on different families of Windows Malware.
Unit-3 - Static Analysis 12 Hour
Advanced Static Analysis- Understanding Computer Basics- Level of Abstraction- Reverse Engineering- X86 Architecture- Main Memory- Instructions- Opcodes and Operands- Registers- Simple Instructions- The
Stack- Conditionals- Branching – REP Instructions- C Main Methods-. Global Vs Local Variables- Disassembling Arthematic Operations- Understanding Functional Calls- Dissembling Arrays- Identifying Structs-
Analyzing Linked List Traversal. Lab: Perform shell code analysis in x86 architecture.
Unit-4 - Advanced Dynamic Analysis 12 Hour
Debugging- OLLYDBG- Loading Malware- OllyDbg Interface- Memory Map- Rebasing- View Threads and Stacks- Executing Code- Breakpoints- Loading DLLs- Tracing- Exception Handling- Patching- Reversing
application using x64dbg- Debugging a Binary using IDA Pro. Lab: Analyze malware binary using debugging tools.
Unit-5 - Malware Functionalities 12 Hour
Malware Behavior- Downloader- Backdoor- Credential Stealer- Persistent Mechanism- Privilege Escalation- Covering Tracking. Lab: Covert Malware Launching

248
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Michael Sikorski, Practical Malware Analysis – The Hands–On Guide to Dissecting 2. Monnappa K A, Learning Malware Analysis: Explore the concepts, tools, and techniques to
Learning
Malicious Software, Kindle Edition, No Starch Press; 1 edition (1 February 2012), ISBN: analyze and investigate Windows malware, Packt Publishing; 1st edition (29 June 2018)
Resources
1593272901. 3. Chris Eagle, the IDA Pro Book, 2nd Edition, No Starch Press, 2011. ISBN-10: 1-59327- 289-8.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Karthik Expert Member from k7 Computing 1. Dr Bhawana Rudra Assistant Professor (Grade II) National Institute of 1. Mr. V. Joseph Raymond, SRMIST
Technology, Warangal

249
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Elective Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

250
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE229J CHECK POINT SYSTEM ADMINISTRATION E PROFESSIONAL ELECTIVE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
describe the basic functions of the Gaia operating system and Understand how SmartConsole is used Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
by administrators to give user access

Environment & Sustainability


CLR-2: understand licensing and contract requirements for Check Point security products

The engineer and society


Conduct investigations of
describe the essential elements of a Security Policy and Understand the Check Point policy layer

Individual & Team Work


Engineering Knowledge
CLR-3:

Design/development of

Project Mgt. & Finance


concept, how to enable the Application Control and URL Filtering software

Modern Tool Usage

Life Long Learning


complex problems
CLR-4: describe how to configure manual and automatic NAT.

Problem Analysis

Communication
identify tools designed to monitor data, determine threats and recognize opportunities for performance
CLR-5:
improvements and Articulate how the Intrusion Prevention System is configured, maintained and tuned

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: describe the key elements of Check Point’s unified security management architecture - - - - 2 - - - - - - - - - -
CO-2: understand Check Point Licensing and creation of various security policies - - 2 - - - - - - - - - - - -
gain insight on how Check Point security features are enabled and policies applied for inspection of
CO-3: - - 2 - - - - - - - - - - - 3
various applications
CO-4: understanding Network Address Translation and User Access Management - - 2 - - - - - - - - - - - 3
CO-5: learn how Check Point firewalls are managed and network traffic is monitored and threat prevention - - - - - - - - - - - - - - -

Unit-1 - Introduction to Check Point Technology and Management Operations 12 Hour


Introduction to checkpoint Technology - Checkpoint security architecture, Controlling network traffic. Introduction to checkpoint deployment – Check point deployment options, Deployment considerations, Deployment
options, Introduction to Gaia operating system. Install the Primary Security Management Server - Installing the Gaia Operating System, Installing the Security Management Server Software, Installing smart Console.
Configure a Security Gateway – Powering on the security gateway, Configuring the security gateway. Check Point Security Management Operations - Network Communication, Smart Console, Smart Console
Applications, Administration. Establishing Secure Internal Communication – Creating Gateway Objects in Smart Console, Testing SIC status to the Gateway. Managing User Access – Creating new administrators
and Assigning profiles, Testing Administrator Profile Assignments – Managing Concurrent Administrator sessions, Taking over an administrator session.
Unit-2 - Check Point Licensing and Creating Various Security Policies 12 Hour
Check Point Licensing – Licensing overview, Smart Update. Manage Licenses – Verifying the status of Existing Licenses in Smart Console, Attaching a License Using Smart Console, and Creating a License Report.
Security Policy Management – Introduction to the Security Policy, Rule base, Global Properties, Publishing Policy, Policy Packages, and Install Policy. Creating the Alpha Standard Security Policy – Creating Policy
Objects, Creating a standard security policy, Installing the Standard Security Policy, Testing the Standard Security Policy. Creating the Bravo Security Policy – Establishing SIC to B-GW, Adding a License to B-GW,
Enabling Security Zones on B-GW, Creating B-GW Security Zones Policy, Testing Internet Connectivity.
Unit-3 - Check Point Policy Layers 12 Hour
Policy Layers – Policy Layers Concept, Traffic Inspection, Managing Layers. Configure Order Layers – Adding Two New Order Layers to be Shared, Configuring the New Ordered Layers Rule, Using the Shared
Layer on Bravo Policy, Testing the Shared APPI+URL Layer on Bravo Gateway, Testing Shared Data Control Layer on Bravo Gateway. Configure a Shared Inline Layer – Creating Shared DMZ Layer, Sharing the
Inline DMZ Layer with Bravo-Policy, Testing the Shared Inline DMZ Layer. Application Control & URL Filtering - Application Control & URL Filtering, Application Control, URL Filtering, Configuring Application Control

251
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
& URL Filtering. Configure a Unified Policy – Creating a Unified Policy Layer, Updating the Appi URL Layer, Creating a Unified Policy. Configure HTTPS Inspection Policy – Enabling HTTPS Inspection, Creating an
HTTP Inspection Rule, Deploying the Security Gateway Certificate, Testing Unified-Policy with HTTPS Inspection.
Unit-4 - Network Address Translation, User Management and Configure Identity Awareness 12 Hour
Network Address Translation – Understanding Network Address Translation, Manual and Automatic NAT. Configuring Network Address Translation – Configuring Automatic NAT on Network Objects, Configuring
Manual Static NAT Rules, Configuring Manual Proxy ARP, Testing the Automatic Hide NAT Configuration, Testing the Static NAT Configuration. User Access Management – Overview of User Access Management,
Methods for Acquiring Identities, Identity Sharing, Distinguished Name, Using Multiple LDAP Servers, Retrieving Information from a User Directory Server, Managing Users on a User Directory Server. Configure
Identity Awareness – configuring the Security Policy for Identity Awareness, Defining the User Access Role, Testing Identity Awareness Connection.
Unit-5 - Traffic Visibility, Monitoring and Threat Prevention 12 Hour
Traffic Visibility – Using Smart Console, Analyzing Logs. Generate and View Traffic – Configuring Log Management on the Security Management Server, Viewing Logs and Performing Searches to gather Historic
Data. Monitoring System States – Monitoring Traffic and Connections. Monitor System States – Enabling the Monitoring Blade, Monitoring Status with Smart View Monitor, Configuring Alerts in Smart View Monitor,
Configuring Suspicious Activity Rules. Threat Prevention – Threat Prevention, Autonomous Threat Prevention, Intrusion Prevention system, IPS Profile Setting and Protections, IPS Tuning and Maintenance, Anti-
Malware, Threat Emulation and Threat Extraction, Internet of Things Protections. Configuring Threat Prevention – Enabling Autonomous Threat Prevention, Testing Anti-Virus Threat Prevention

1. Check Point Certified Security Administrator (CCSA), Student and Lab Manual, Check Point 5. Multi-Domain Security Management, R80, Administration Guide, 30 March 2016.
Secure Academy, Check Point Software Technologies Ltd, 2022. 6. CCSA™ NG: Check Point Certified Security Administrator Study Guide, Justin
(https://read.kortext.com/reader/pdf/2003557/11) Menga, San Francisco, SYBEX Inc., Alameda, CA, www.sybex.com.
Learning
2. http://supportcontent.checkpoint.com/documentation_download?ID=46577 7. Security Administration, Student & Lab Manual, © 2019 Check Point Software
Resources
3. Firewall, Pre-R80 Security Gateways with R80 Security Management, 28 March 2016, Check Technologies Ltd. R80.20 v1.
Point Software Technologies Ltd. 8. Check Point Certified Security Administrator (CCSA R80): 156-215.80 Exam.
4. Check Point Security Management R80 Administration Guide, 15 January 2017. 9. https://www.checkpoint.com/mind/self-study-resources/

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Vigneshwaran P, SRMIST
2. Dr. C.N.S. Vinoth Kumar, SRMIST
3. Dr. S. Thanga Revathi, SRMIST

252
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE281T CRYPTOGRAPHY AND NETWORK SECURITY E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: the purpose of learning this course is to: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquire fundamental knowledge on the concepts of finite fields, number theory and cryptography

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: describe the various block cipher algorithms and public key cryptosystems

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: utilize the principles of hash functions and digital signature

Environment &
Sustainability
CLR-5: acquire the knowledge on firewall and security applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: implement the Classical Encryption Techniques 2 2 - - - - - - - - - - - - -
CO-2: implement the various block cipher algorithms and public key cryptosystems 2 2 - - - - - - - - - - - - -
CO-3: apply the principles of hash functions and digital signature 2 - - - - - - - - - - - - - -
CO-4: demonstrate the configuration of Firewall and the concepts of WLAN Security - - - - - - - - - - - - - - 3
CO-5: apply the knowledge gained in various security applications in real-time problems 2 2 - - - - - - - - - - - - 3

Unit-1 - Introduction to Security and Number Theory 9 Hour


Basics of Security – CIA Triad – Threats, Attacks and Services – Classical Cryptography –symmetric and asymmetric cipher- Substitution – Transposition – Cryptanalysis. Tutorial 1: Substitution techniques. Number
Theory: Groups, Rings, Fields- Modular Arithmetic – Euclidean Theorem – Extended Euclidean Theorem – Galois Field – Tutorial 2: Implement Euclid and extended. Prime Numbers – Fermat’s Theorem – Euler’s
totient function – Euler's Theorem – Chinese Remainder theorem –Primitive Roots-Discrete Logarithms-Elliptic curve arithmetic -Tutorial 3: Implement Chinese Remainder Theorem
Unit-2 - Block Cipher and Public Key Cryptography 9 Hour
Block Cipher – Feistel Ciphers – Data Encryption Standard (DES) – DES Structure – Key Generation – Simplified DES – Advanced Encryption Standard (AES) – Basic Structure – Transformations – Key Expansions
Process – Tutorial 4: Implement SDES - Modes of operation. Public Key Cryptosystems – RSA Algorithm – Tutorial 5: Implement RSA algorithm - ElGamal Cryptosystems – Diffie-Hellman key exchange – Elliptic
curve cryptography- Quantum Cryptography – Threshold Cryptography - Tutorial 6: Implement Diffie-Hellman Key exchange algorithm
Unit-3 - V Hash Functions and Digital Signatures 9 Hour
Message authentication requirements- Message Authentication functions -Hash Functions-Hash Algorithms: MD5- Tutorial 7: Implement MD5 - Secure Hash Algorithm- Tutorial 8: Implement SHA - Digital signatures:
Digital signature requirements- Digital Signature scheme- Elgamal Digital signature scheme- Schnoor Digital signature scheme- User Authentication protocol- Kerberos - Tutorial 9: Implement Elgamal Digital
signature scheme.
Unit-4 - Introduction to Network Security 9 Hour
Networking Devices (Layer1,2,3)- Different types of network layer attacks -Buffer Overflow and Malicious Software – Tutorial 10: Discussions on Buffer overflow attack - Password Management – Introduction to
Firewall– Firewall Generations – Tutorial 11: Discussions on Firewall configurations - Intrusion Detection System – Types of IDS – Intrusion Prevention System – Wireless LAN – Wireless LAN Security – Network
Access Control and Cloud Security- Tutorial 12: Discussions on IDS.

253
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Security Applications 9 Hour
Digital Certificate – Key Management – Kerberos – Key Agreement and Distribution – PKI – X.509 Certificate – E-Mail Security – PGP – S/MIME – Tutorial 13: Discussions on E-mail security - IP security – IPSEC
protocol suite – functionalities – Transport mode – Authentication Header – Introduction to Encapsulation Security Payload - IKE Phase I, II - Virtual Private Network (VPN) – Tutorial 14: Discussions on VPN - Web
Security – Secure Socket Layer (SSL) –Transport Layer Security – Secure Electronic Transaction (SET) – Blockchain - Tutorial 15: Discussions on SSL

1. William Stallings, “Cryptography and Network Security”, 3rd Edition, Pearson Education, 3. Charles Pfleeger,” Security in Computing”, Prentice Hall, 4th Edition, ISBN-10: 0132390779,
Learning 2003. ISBN-13: 978- 01323907744, 2006. Earl Gose, Richard Johnsonbaugh, Steve Jost, “Pattern
Resources 2. Charlie Kaufman, Radia Perlman, Mike Speciner, “Network Security”, Prentice Hall,2 nd Recognition and Image Analysis”, Prentice Hall of India Private Ltd., New Delhi – 110 001, 1999.
edition, ISBN-10: 0130460192, ISBN-13: 978-0130460196, 2002.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 10% - 10% - 10% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 20% - 20% - 20% -
Level 6 Create 10% - 10% - 10% -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. S. Sajiv, Technical Leader, CISCO 1. Dr. A. Balaji, School of Computing Science and Engineering (SCSE), 1. Ms.G. Sujatha, SRMIST
VIT Bhopal University
2. Mr. Varun Subramanian, QA Automation Tester, Likewize

254
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE282T INFORMATION SECURITY E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: to understand the basics of Information Security 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: to know the legal, ethical, and professional issues in Information Security

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: to know the aspects of risk management

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: to become aware of various standards in this area

Environment &
Sustainability
CLR-5: to know the technological aspects of Information Security

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: discuss the basics of information security - - 2 - - - - 2 - - - - - - 3
CO-2: illustrate the legal, ethical, and professional issues in information security - - 2 - - - - - - - - - - - -
CO-3: demonstrate the aspects of risk management - - - - - - - 2 - - - - - - -
CO-4: become aware of various standards in the Information Security System - - 2 - - - - - - - - - - - 3
CO-5: design and implementation of Security Techniques - - 2 - - - - - - - - - - - -

Unit-1 - Introduction 9 Hour


History, What is Information Security? Critical Characteristics of Information, NSTISSC Security Model, Components of an Information System, Securing the Components, Balancing Security and Access, The SDLC,
The Security SDLC
Unit-2 - Security Investigation 9 Hour
for Security, Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues - An Overview of Computer Security - Access Control Matrix, Policy-Security policies, Confidentiality policies, Integrity policies
and Hybrid policies
Unit-3 - Security Analysis 9 Hour
Risk Management: Identifying and Assessing Risk, Assessing and Controlling Risk - Systems: Access Control Mechanisms, Information Flow and Confinement Problem
Unit-4 - Logical Design 9 Hour
Blueprint for Security, Information Security Policy, Standards and Practices, ISO 17799/BS 7799, NIST Models, VISA International Security Model, Design of Security Architecture, Planning for Continuity
Unit-5 - Physical Design 9 Hour
Security Technology, IDS, Scanning and Analysis Tools, Cryptography, Access Control Devices, Physical Security, Security and Personnel

1. Michael E Whitman and Herbert J Mattord, ―Principles of Information Securityǁ, Vikas 3. Micki Krause, Harold F. Tipton, ― Handbook of Information Security Managementǁ, Vol 1-3
Learning
Publishing House, New Delhi, 2021 CRCPress LLC, 2019
Resources
2. Matt Bishop, ― Computer Security Art and Scienceǁ, Pearson/PHI, 2021 4. Stuart McClure, Joel Scrambray, George Kurtz, ―Hacking Exposedǁ, Tata McGraw- Hill, 2019

255
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 10% - 10% - 10% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 20% - 20% - 20% -
Level 6 Create 10% - 10% - 10% -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.M. Vivekanandan,Nokia 1. Mr.Karthikeyan.C.M. T,Govt College of Engg,Bargur 1. Mrs.D.Saveetha, SRMIST
2. Mr. Santhosh Kumar,CTS 2. Mr.Syedthouheed, Reva University, Bangalore

256
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE283T CYBER LAW E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basics of cyber law and cyber security 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: familiarize the issues those are specific to amendment rights

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: become aware on copyright issues in software’s

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the Cyber-crimes and Cyber Frauds

Environment &
Sustainability
CLR-5: understand the Legal Framework

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain in-depth knowledge on information on cyber security and issues specific to amendment rights - - - - 2 - 2 - - - - - - - 3
CO-2: apply the knowledge on copyright issues within software packages - - - - - - - - - - - - - - 3
CO-3: comprehend ethical laws of computer for various countries - - - - 2 - - - - - - - - - -
CO-4: defines the Cyber-crimes and frauds - - - - - - 2 - - - - - - - -
CO-5: apply the knowledge of Legal framework - - - - - - 2 - - - - - - - -

Unit-1 - Introduction 9 Hour


History of Internet and World Wide Web - Need for cyber law - Cyber-crime on the rise - Important terms related to cyber law - Cyber law in India - Need for cyber law in India - History of cyber law in India - Information
Technology Act, 2000 - Overview of other laws amended by the IT Act, 2000 - National Policy on Information Technology 2012
Unit-2 - Overview of the Information Technology Act, 2000 9 Hour
Applicability of the Act - Scheme of the Act - Important provisions of the Act - Digital Signature under the IT Act, 2000 - E-Governance - Attribution, Acknowledgement and Dispatch of Electronic Records - Certifying
Authorities - Controller of Certifying Authorities (CCA) - Security Guidelines for Certifying Authorities - Electronic Signature Certificates - Duties of Subscribers - Penalties and Offences Intermediaries - RULES
ISSUED UNDER THE IT ACT, 2000
Unit-3 - Cyber-Crimes / Cyber Frauds 9 Hour
Definition of cybercrime - First Cyber-crime- Types of cyber frauds - Cyber frauds in India - Preventive measures - Cyber-crimes - Who commits cyber-crimes? - Penalties and offences under the IT Act, 2000 -
Offences under other legislations - Investigation of cyber-crimes in India - Regulatory Authorities
Unit-4 - Cyber Crimes and Legal Framework 9 Hour
Cyber Crimes against Individuals, Institution and State – Hacking - Digital Forgery -Cyber Stalking/Harassment - Cyber Pornography -Identity Theft & Fraud - Cyber Terrorism - Cyber Defamation - Right to Privacy
and Data Protection on Internet -Concept of privacy - Self-regulation approach to privacy -Ingredients to decide confidentiality of information -Intellectual Property Issues in Cyber Space -Interface with Copyright
Law -Interface with Patent Law - Trademarks &Domain Names Related issues -Dispute Resolution in Cyberspace
Unit-5 - Cyber Security 9 Hour
Network and website Security Risks –Hacking -E-business Risk management issues –Firewall -Security framework –Cryptocurrency -Blockchain –Technology Stack: Protocol, Currency -Crowd Funding -Bitcoin -
rediction Markets -Smart Property -Smart Contract -Decentralized Governance Services -E Payments -Digital Token based E payment systems -E Wallet - Online financial services in India -Law to Protect online
financial service fraud
257
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Justice Yatindra Singh, Cyber Laws, Universal Law Publishing Co, New Delhi, (2012). 6. Upadhyaya and A. Upadhyaya, Material Science and Engineering, Anshan
2. Verma S, K, Mittal Raman, Legal Dimensions of Cyber Space, Indian Law Institute, New Delhi, (2004) Publications, 2007
Learning
3. S. R. Bhansali, Information Technology Act, 2000, University Book House Pvt. Ltd., Jaipur (2003). 7. Vasu Deva, Cyber Crimes and Law Enforcement, Commonwealth Publishers, New
Resources
4. Blockchain, Blueprint for a new Economy, Melanie Swan, 2017 –O’Reilly Delhi, (2003).
5. SudhirNaib, The Information Technology Act, 2005: A Handbook, OUP, New York, (2011) 8. Essential CyberSecurity Science, Josiah Dykstra, 2017 –O’Reilly

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 10% - 10% - 10% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 20% - 20% - 20% -
Level 6 Create 10% - 10% - 10% -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Venkata Prasad S, TATA consultancy services, 1. Dr. Abhishek Srivastava, [email protected], 1. Dr.S. Murugaanandam, SRMIST
svenkataprasad, @yahoo. com CSE, IIT, Indore.
2. Dr. A. Amuthan, [email protected],
Pondicherry Engineering College, Pondicherry.

258
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE381T FORENSICS AND INCIDENT RESPONSE E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: gain knowledge on the basics of procedures for identification, preservation of electronic evidence 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the purpose and usage of various forensic tools

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gain knowledge on how scientific evidence collection/extraction during investigation

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: acquire knowledge on file systems and its working

Environment &
Sustainability
CLR-5: understand the windows and Linux investigation procedures

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the knowledge on basics of procedures for identification, preservation of electronic evidence - - 2 - - - - - - - - - - - -
CO-2: acquire the ability to identify the purpose and usage of various forensic tool - - - - - - - 2 - - - - - - -
CO-3: understand how scientific evidence collection/extraction during investigation - - 2 - - - - 2 - - - - - - 3
CO-4: appreciate the concepts of file systems and its importance in forensic science - - - - - - - 2 - - - - - - 3
CO-5: apply the knowledge of windows and Linux investigation procedures - - 2 - - - - - - - - - - - -

Unit-1 – Introduction to Incident 9 Hour


Goals of Incident Response-Introduction to Incident Response Methodology (IRM)- Steps in Incident Response Methodology-IRM: Pre-incident preparation-IRM: Detection of incidents-IRM: Initial Response-IRM:
Formulate a Response Strategy-IRM: Investigate the Incident-IRM: Reporting-Creating response toolkit – Windows-Volatile Data Collection – Windows-In-depth data collection – Windows-Storing collected data –
Windows-Creating response toolkit – Unix-Volatile Data Collection – Unix-In-depth data collection – Unix-Storing collected data – Unix
Unit-2 – ACPO Principles 9 Hour
Introduction to ACPO Principles-ACPO Principles of Computer Based Evidence-Introduction to computer Storage Formats-Understanding Storage Formats for Digital Evidence-Forensic Duplication-Forensic
Duplication tools-Forensic Duplicate creation of HDD-Qualified Forensic Duplicate creation-Restored Image-Mirror Image-Forensic Duplication Tool Requirements-Creating a Forensic Duplicate of a Hard Drive-
Evidence Handling-Types of Evidence-Challenges in Evidence Handling-Overview of Evidence Handling Procedure.- Evidence Handling Procedure-Evidence Handling reports
Unit-3 – File System Analysis 9 Hour
Introduction to File System Analysis-What is a File System? - Five Data Categories-FAT Concepts-FAT Analysis-FAT - The Big Picture-Introduction to NTFS-Files in NTFS-MFT Concepts-MFT Attribute Concepts-
Other MFT Attribute Concepts-Indexes in NTFS-NTFS Analysis - File System Category-NTFS Analysis - Content Category-NTFS Analysis - Metadata Category-NTFS Analysis - File Name Category-NTFS Analysis
- Application Category-NTFS - The Big Picture
Unit-4 – Investigating Systems 9 Hour
Introduction to Investigating Systems-Investigating Windows Systems-Where Evidence resides on Windows Systems-Conducting a Windows Investigation I-Conducting a Windows Investigation II-File Auditing-Theft
of Information-Handling the departing employee-Investigating Unix Systems-Overview of steps - Unix Investigation-Reviewing pertinent logs-Performing keyword searches-Reviewing relevant files-Identifying
unauthorized user accounts/groups-Identifying rogue processes-Checking for unauthorized access points-Analysing trust relationships-Detecting loadable kernel modules

259
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 – Investing Hacker Tools 9 Hour
Investigating Hacker Tools-What are the goals of tool analysis?- How are files compiled?- Static Analysis of Hacker Tools I-Static Analysis of Hacker Tools II-Dynamic Analysis of Hacker Tools I-Dynamic Analysis
of Hacker Tools II-Evaluating Computer Forensics Tools-Types of Forensic Tools-Tasks performed by Forensic Tools-Tool comparisons-Computer Forensics Software Tools-Computer Forensics Hardware Tools-
Validating and Testing Computer Forensics Software-Introduction to Forensic Report Writing-Understanding the Importance of Reports-Guidelines for Writing Reports-A Template for Computer Forensics Reports

1. Kevin Mandia, Chris Prosise, Incident Response and computer forensicsǁ, Tata 3. Eoghan Casey,"Hand book Computer Crime Investigation's Forensic Tools and Technology",
McGrawHill, 2006. Academic Press, 1st Edition, 2001.
Learning
2. Bill Nelson, Amelia Philips, and Christopher Steuart, ―Guide to computer forensics 4. Brian Carrier, ―File System Forensic Analysisǁ, Addison-Wesley Professional; 1st edition 2005,
Resources
and investigationsǁ, course technology, CengageLearning;4thedition, ISBN:1-435- ISBN13: 978-0321268174
49883-6,2009

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.M. Vivekanandan,Nokia 1. Mr.Karthikeyan.C.M. T,Govt College of Engg,Bargur 1. Mrs.D.Saveetha, SRMIST
2. Mr. Santhosh Kumar,CTS 2. Mr.Syedthouheed, Reva University, Bangalore

260
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE382T SECURITY MANAGEMENT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline various security management policies, principles, the various plans for security management 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes

Environment & Sustainability


CLR-2: explain risk management identification, risk assessment and risk identification techniques

The engineer and society


Conduct investigations of
illustrate various types of analysis such as vulnerability analysis, penetration testing, audit trail analysis,

Individual & Team Work


Engineering Knowledge
CLR-3:

Design/development of

Project Mgt. & Finance


system and network monitoring, and configuration management

Modern Tool Usage

Life Long Learning


complex problems
demonstrate the knowledge and skills for risk analysis and assessment of enterprise systems using

Problem Analysis
CLR-4:

Communication
various practical and theoretical tools
CLR-5: manage detailed enterprise-wide security plans and policies

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify fundamentals of security management policies and plans - - 2 - - - - - - - - - - - -
CO-2: obtain knowledge from risk assessment and risk identification techniques - - 2 - - - - - - - - - - - -
gain information from vulnerability analysis, penetration testing, audit trail analysis, system, and network
CO-3: - - - - 2 - - - - - - - - - 3
monitoring
CO-4: analysis and assess the enterprise systems using various tool - - - - 2 - - - - - - - - - 3
CO-5: enhance their knowledge of obtaining enterprise-wide security plans and policies - - 2 - - - - - - - - - - - -

Unit-1 - Introduction to Security Management 9 Hour


Overview of security policies, models and mechanisms, Security Management Principles, Models and Practices, Security Planning and Asset Protection, Developing Security Programs and Disaster Recovery Plans
Unit-2 - Principles of Risk and Risk Management 9 Hour
Introduction and identification, risk analysis and evaluation, Practice of Risk Management, Risk Assessment- Types and sources of risk information, Risk identification techniques, Risk Treatment-Evaluating and
selecting risk control mechanisms, Identifying, allocating, and resourcing risk controls.
Unit-3 - Security Analysis and Safeguards 9 Hour
Vulnerability analysis, Penetration testing, Protection Mechanisms, and Incident handling- Access Control and Authentication architecture, Auditing systems and audit trail analysis, Configuration Management
Unit-4 - Network Defense and Countermeasures 9 Hour
Intrusion Detection Systems (SNORT), Architectural configurations and survivability issues, Firewall configurations and network design, Virtual private networks, Dial-up security, Computer, and network forensic,
Privacy Protection, Case studies on OS and application software (e.g., SELinux, Unix and Windows).
Unit-5 - Standards and Security Certification Issues 9 Hour
Rainbow Series, Common Criteria, Security Certification Process, Case studies, National and International Security Laws and Ethical Issues

261
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Management of Information Security, M. E. Whitman, H. J. Mattord Cengage Learning, 2016. 5. Security Engineering: A Guide to Building Dependable Distributed Systems, Ross Anderson,
2. Guide to Disaster Recovery 1st Edition by Michael Erbschloe. Wiley, John& Sons, Incorporated, 2001.
Learning
3. Guide to Network Defense and Countermeasures Paperback – Import by Greg Holden, 2003 6. Software Security: Building Security In (by Gary McGraw)
Resources
4. Security in Computing, 2nd Edition, Charles P. Pfleeger, Prentice Hall, 2005. 7. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
(by MarkDowd, John McDonald, Justin Schuh)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.T Ravichandran, Product Manager, Servis2 IT Team, Chennai. 1. Dr. P. Balamurugan, SRMIST
2. Mr.Dhanvanth Kesavan, NTT Data Cyber security analyst, Chennai.

262
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE383T SECURITY GOVERNANCE, RISK AND COMPLIANCE E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: analyze the expanding role of IT governance and its effect on organizations 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: be aware of management issues in IT governance

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: analyze the role of risk to an organization and ways to identify key risk factors

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: evaluate various risks and appropriate actions

Environment &
Sustainability
CLR-5: develop naming conventions for the resources in a system

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: having an overview of IT governance 2 - - - - - - - - - - - - - -
CO-2: undergo an risk assessment - 2 - - - - - - - - - - - - -
describe legal and ethical considerations related to the handling and management of enterprise
CO-3: - - - 2 - - - - - - - - - - 3
information assets
specify what constitutes admissible evidence in a legal proceeding and how to acquire and maintain this
CO-4: - 2 - - - - - - - - - - - - 3
information
CO-5: create a set of policies that implement a specified organizational objective - - - 2 - - - - - - - - - - -

Unit-1 – Introduction to IT Governance 9 Hour


Introduction to IT Governance, IT Risk Management Life Cycle, IT Risk framework, IT Risk identification, IT Risk Security Governance, IT Risk assessment, IT Risk evaluation, IT Risk response, IT Risk monitoring
and reporting.
Unit-2 - Standards 9 Hour
overview of Industry Best Practice Standards, Model and Guidelines covering some aspect of IT governance, principles of Business/IT Alignment Excellence, principles of Program/Project Management Excellence,
principles of IT Service Management and Delivery Excellence, principles of Vendor Management, Outsourcing Excellence, critical success factors, Case Study.
Unit-3 – Security Design Principles 9 Hour
Security mind-set, Design principles, System/security life-cycle, Security implementation mechanisms, Information assurance analysis model, Disaster recovery, Forensics, threats, vulnerabilities, attacks,
countermeasures
Unit-4 – Security Trends and Audit 9 Hour
Trends, Auditing, Cost / benefit analysis, Asset management, Standards, Enforcement, Legal issues, Disaster recovery, security related issues and incidents.
Unit-5 – Security Policies 9 Hour
Creation of policies, Maintenance of policies, Prevention, Avoidance, Incident response, Domain integration, social engineering, Protocol attacks, Security awareness

263
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Iannarelli, J. G., & O’Shaughnessy, M. O. (2015). Information governance and security: Protecting and 3. Legal Issues in Information Security, Joanna Lyn Grama, 2015. Jones &
Learning managing your company’s proprietary information. Waltham, MA: Butterworth Heinemann, Elsevier. Bartlett Learning, Second Edition, ISBN: 978-1-284-05474-3.
Resources 2. Van Wyk, K. R., Graff, M. G., Peters, D. S., & Burley, D. L. (2015). Enterprise software security: A 4. Ethics of Big Data, Kord Davis, 2012. O’Reilly Media, ISBN: 978-1449311797
confluence of disciplines. Upper Saddle River, NJ: Pearson Education.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Kesawan HCL Technologies 1. Dr. Surendran Rajendran AMA International University Bahrain 1. Mr.Arun.A, SRMIST
2. Mr.Celeian, Symantec

264
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE384J SECURITY AUDIT AND RISK ASSESSMENT E PROFESSIONAL ELECTIVE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline the fundamentals of security audit components and process 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate various security audit phases and methods to audit the resources

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: outline the process of data collection for security risk assessment

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: explain how the collected risky data are analyzed to find the final risk score

Environment &
Sustainability
CLR-5: introduce the concepts of risk assessment methodology

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: describe the concepts of Security audit components and process - 2 - - - - - - - - - - - - -
CO-2: apply the various security audit phases and methods to audit the resources - 2 - - - - - - - - - - - - -
CO-3: demonstrate the process of data collection for security risk assessment - - 2 - - - - 2 - - - - - - 3
CO-4: evaluate the risk score using risk data analysis techniques - - - - - - - 2 - - - - - - 3
CO-5: assess the risk with different risk assessment methodology - - 2 - - - - 2 - - - - - - -

Unit-1 - Basics of Information Security 12 Hour


Security Metrics and Reporting, Common Issues and Variances of Performance Metrics, Introduction to Security Audit, Need, Steps in Security Audit. Auditable resources in an organization, Servers and Storage
devices, Infrastructure and Networks, Communication Routes, Lab1: Working with Trojans, Backdoors and sniffer for monitoring network communication System, Information Security Methodologies (Black-box,
White-box, Grey-box), Phases of Information Security Audit and Strategies, Ethics of an Information Security Auditor.Lab2: Understanding Data Packet Sniffers, Security Audit Part I- Auditing PC-based Accounting
System, Auditing Operating Systems, Auditing Networks, Auditing Electronic Data Interchange, Controlling and auditing Database Management Systems. Lab 3: Windows Hacking – NT LAN Manager, Secure 1
password recovery
Unit-2 - Security Audit 12 Hour
Pre-audit checklist, Information Gathering, Vulnerability Analysis, Lab 1: UDP Scan Using nmap, TCP Connect Scan Using nmap, TCP SYN Scan Using nmap External Security Audit, Internal Network Security
Audit, Firewall Security Audit, Lab 2: Vulnerability Identification and Prioritization, IDS Security Auditing, Social Engineering Security Auditing, Web Application Security Auditing, Information Security Audit Deliverables
& Writing Report, Result Analysis, Post Auditing Actions, Report Retention etc. Lab 3: Web Application Security Configuration
Unit-3 - Fundamentals of Risk 12 Hour
What is Risk? –Information Security Risk Assessment Overview Drivers, Laws, and Regulations- Risk Assessment Frame work – Lab1: Risk assessment with NIST framework. Phases of Security Risk Assessment,
Data Collection: The Sponsors- The Project Team- Data Collection Mechanisms, Executive Interviews- Document Requests- IT Assets Inventories, Lab2: Data Collection using Container method, Profile & Control
Survey-Consolidation, Lab3: Survey Consolidation of the collected data.
Unit-4 - Risk Analysis 12 Hour
Compiling Observations-Data Analysis: Preparation of catalogues- Lab1: Prepare an automated Threat-vulnerability pair matrix, System Risk Computation, Designing Impact Analysis Scheme-Confidentiality, Integrity
and Availability, Impact Score, Lab2: Preparation of an automated impact score, designing control analysis, Designing Likelihood Analysis: Exposure, Frequency, Controls, Computing Final Risk Score, Lab3:
Preparation of an automated Likelihood score and final risk score.
265
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Risk Classification and Prioritization 12 Hour
Stem Risk Analysis-Risk Classification, Risk Ranking, Individual Risk Reviews, and Lab1: Prepare the Risk Analysis with individual system risk review and threat and vulnerability risk review, Organization risk
Analysis, Risk Prioritization- Organization and System Specific Risk prioritization and Treatment, Lab2: Prepare an automated Organization and system specific risk prioritization and treatment template. Risk
Assessment Methodologies- Result- Risk Registers-Process summary-post mortem. Lab3: Prepare the risk register.

1. Mark Talabis, “Information Security Risk Assessment Toolkit: Practical Assessments 3. Andrew Vladimirov Michajlowski, Konstantin, Andrew A. Vladimirov, and Konstantin V. Gavrilenko.
through Data Collection and Data Analysis”, Syngress; 1 edition, ISBN: 978-1- Assessing information security: strategies, tactics, logic, and framework. IT’S Governance Ltd, 2010.
Learning
59749-735-0, 2013. 4. https://www.sans.org/reading-room/whitepapers/threats/implementing-vulnerability-management-
Resources
2. Whitman, Michael E., and Herbert J. Mattord. Management of information security. process-34180
Cengage Learning, 2013. 5. http://csrc.nist.gov/publications/nistpubs/800-40-Ver2/SP800-40v2.pdf

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts

266
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE385J ADVANCED MALWARE ANALYSIS E PROFESSIONAL ELECTIVE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the purpose of malware analysis 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: gain knowledge about taxonomy of malware and infection vectors

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


CLR-3: gain knowledge about protective mechanisms and dependencies

Modern Tool Usage

Life Long Learning


complex problems
CLR-4: to analyze different malware families and perform static and dynamic mechanisms

Problem Analysis

Communication
Environment &
explore popular plug-ins that make writing OllyDbg debugger easier, allow collaborative reverse

Sustainability
CLR-5:
engineering

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain knowledge about the different forms of malware - 2 2 - 2 - - - - - - - - - -
CO-2: set up a safe virtual environment to analyze malware - - 2 - - - - - - - - - - - -
CO-3: navigate, comment, and modify malware samples - - - - 2 - - - - - - - - - -
CO-4: use tools and perform static and dynamic analysis - 2 - - - - - - - - - - - - 3
CO-5: use debugger to tackle hostile and obfuscated code - - - - 2 - - - - - - - - - 3

Unit-1 - Malware Analysis and Reverse Engineering 12 Hour


blueprint- Malware Analysis and Reverse Engineering- Types and purpose of Malware Analysis- Limitation- Effective Malware Analyst- Lab: Basic static analysis using python
Unit-2 - Malware Taxonomy and Deployment 12 Hour
Malware Classes- Malware Infection Vectors- Types of Infection Vector- Potential Infection Vector- Lab: Setting up lab for dynamic analysis
Unit-3 - Protective Mechanisms and Dependencies 12 Hour
States of Malware- Static and Dynamic – Dependency Types- Malware Collections- Malware Inspection- PE File – Handle Files – Inspecting Static Malware – Inspecting Dynamic Malware - Malware Analysis Use
Case- Tools of the trade-Lab: Dynamic analysis of Downloader, Dropper , Fake AV and Ransomware
Unit-4 - Reverse Engineering 12 Hour
OllyDbg- Memory Map- Viewing thread and stack- Execution code- Breakpoints- Loading DLL’s- Tracing- Exception Handling- Patching- Analyzing shell code- Understanding x64 debugger – Lab: Reverse
applications using x64 debugger
Unit-5 - Advanced Functionalities 12 Hour
Launcher’s- Process Injection – Process Replacement- Hook Injection- APC Injection- Simple Cipher’s- Custom Encoding- Decoding- Lab- Use IDA Pro and look for potential encoding in given malware sample

1. Michael Sikorski, Practical Malware Analysis – The Hands–On Guide to Dissecting Malicious 3. Christopher C. C. Elisan, Advanced Malware Analysis, 1st Edition, Kindle Edition, ISBN-13:
Learning Software, Kindle Edition, No Starch Press; 1 edition (1 February 2012), ISBN: 1593272901. 978-0071819749
Resources 2. Monnappa K A, Learning Malware Analysis: Explore the concepts, tools, and techniques to
analyze and investigate Windows malware, Packt Publishing; 1st edition (29 June 2018).

267
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Karthik Expert Member from k7 Computing 1. Dr Bhawana Rudra Assistant Professor (Grade II) 1. Mr. V. Joseph Raymond, SRMIST
National Institute of Technology, Warangal

268
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE386J PENETRATION TESTING AND VULNERABILITY ASSESSMENT E PROFESSIONAL ELECTIVE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: study fundamental concepts in Vulnerability Assessment and Penetration Testing 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: experiment with Penetration testing framework - Metasploit & its Usage

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


exploit vulnerability detection & explore various other social engineering techniques provided by Social
CLR-3:

Modern Tool Usage


Engineering Toolkit

Life Long Learning


complex problems
Problem Analysis

Communication
CLR-4: perform a penetration test using Metasploit

Environment &
Sustainability
CLR-5: execute a penetration test with integrated Metasploit services

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: study fundamental concepts in Vulnerability Assessment and Penetration Testing - 2 2 - - - - - - - - - - - -
CO-2: experiment with Penetration testing framework - Metasploit & its Usage - - - - 2 - - - - - - - - - -
exploit vulnerability detection & explore various other social engineering techniques provided by Social
CO-3: - - 2 - - - - - - - - - - - -
Engineering Toolkit
CO-4: perform a penetration test using Metasploit - - - - 2 - - - - - - - - - 3
CO-5: execute a penetration test with integrated Metasploit services - - 2 - - - - - - - - - - - 3

Unit-1 - Need for Vulnerability Assessment 12 Hour


The life cycles of Vulnerability Assessment and Penetration Testing -Introduction to Nessus - Installing Nessus on different platforms -prerequisites - Policy configuration - Scan configuration -lementation of scanning
the IT infrastructure using Nessus tool - Report interpretation - False positive analysis - Vulnerability analysis & Vulnerability exploiting -Performing scan results analysis, which will cover false positive analysis,
vulnerability analysis, exploiting vulnerabilities, and so on.
Unit-2 - Vulnerability Assessment Versus Penetration Testing 12 Hour
The need for a penetration testing framework - Introduction to Metasploit - Setting up Your Environment – Metasploit - Metasploit components -Playing around with msfconsole - Variables in Metasploit - Browse
through the directory structure of the Metasploit Framework &try out some of the common console commands - Information gathering and enumeration - Password sniffing - Advanced search with shodan - Try to
explore and execute the Shodan auxiliary module to find out various internet connected devices
Unit-3 - Vulnerability Hunting with Metasploit 12 Hour
Managing the database – NMAP - Post exploitation - Using any auxiliary module that can be used for vulnerability detection & explore various features of meterpreter. - Need of client-side attacks with Metasploit -
The msfvenom utility - Social Engineering with Metasploit - Explore various other social engineering techniques provided by Social Engineering Toolkit & Get familiar with various parameters and switches of
msfvenom - Web Application Scanning with Metasploit - Web application scanning using WMAP - Metasploit Auxiliaries for Web Application - enumeration and scanning - Find and exploit vulnerabilities in the
following vulnerable applications: DVWA, Mutillidae, OWASP Webgoat

269
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Organizing a Penetration Test 12 Hour
Conducting a penetration test with Metasploit -Case study - diving deep into an unknown network - Perform post-exploitation on the Windows 7 system and identify five best post exploitation modules - The absolute
basics of exploitation - Exploiting stack-based buffer overflows with Metasploit - Bypassing DEP in Metasploit modules - Implementation Metasploit exploit module for DEP bypass - Performing a penetration test
with integrated Metasploit services - Exploiting the Active Directory (AD) with Metasploit - Generating manual reports -Perform a penetration test on a network using OpenVAS built-in connectors and various
Metasploit extensions, and how a proper report of the test can be generated
Unit-5 - Vulnerability Management Plan 12 Hour
The Six Stages of Vulnerability Management - Measuring the Performance of a Vulnerability Management Program - Demonstration of any windows based Vulnerability Management Tools - Vulnerability Management
Tools - Evaluating Vulnerability Management Tools - Open Source and Free Vulnerability Management Tools - Demonstration of any open source Vulnerability Management Tools - Patch Management - Building a
Patch Test Lab- Patch Distribution and Deployment - Demonstration of any Patch Management Software

1. Himanshu Kumar - Learning Nessus for Penetration Testing_ Master how to perform 3. Steve Manzuik, Andre Gold, Chris Gatford - Network Security Assessment_ From Vulnerability to
IT infrastructure security vulnerability assessments using Nessus with tips and insights Patch-Syngress (2006)
Learning
from real-world challenges. 4. Thomas R. Peltier, Justin Peltier, John A. Blackley - Managing A Network Vulnerability
Resources
2. Sagar Rahalkar, Nipun Jaswal - The Complete Metasploit Guide_ Explore effective Assessment-Auerbach Publications (2003)
penetration testing techniques with Metasploit-Packt Publishing (2019)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 25% 25% -
Level 3 Apply 30% - - 30% 30% -
Level 4 Analyze 30% - - 30% 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. S. Sajiv, Technical Leader, CISCO 1. Dr. A. Balaji, School of Computing Science and Engineering (SCSE), 1. Dr. S. Prabakeran, SRMIST
VIT Bhopal University
2. Mr. Varun Subramanian, QA Automation Tester, Likewize

270
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE387J HACKER TECHNIQUES, TOOLS, AND INCIDENT HANDLING E PROFESSIONAL ELECTIVE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: explain the history and current state of hacking and penetration testing, including ethical and legal 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: implications

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: identify common information gathering tools and techniques

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: identify and remove common types of malwares from infected systems

Environment &
Sustainability
CLR-5: identify Trojans, backdoors, and covert communication methods

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: analyze how port scanning and fingerprinting are used by hackers - 2 - - - - - - - - - - - - -
CO-2: analyze wireless network vulnerabilities exploited by hackers - 2 - - - - - - - - - - - - -
CO-3: gain knowledge to Perform web and database attacks - 2 - - - - - - - - - - - - 3
CO-4: acquire knowledge to Perform network traffic analysis and sniffing by using appropriate tools - - - - 2 - - - - - - - - - 3
CO-5: utilize the concepts of Compare and contrast defensive technologies - - - - 2 - - - - - - - - - -

Unit-1 - Introduction 12 Hour


The Next Generation - TCP/IP Review, Cryptographic Basics, Symmetric and Asymmetric Encryption - Purpose of Public Key Infrastructure - Hashing - Physical Security - Lab 1: Cloud Investigations for the steps
for conducting a cloud security incident investigation and with essential cloud logging assets for incident response. Data collection and isolation for compromise assessment, applying cloud recovery and remediation
following an incident, Complete cloud compromise incident response walkthrough. Lab 2: Assessing and Securing Systems on a Wide Area Network (WAN) Lab 3: Applying Encryption and Hashing Algorithms for
Secure Communications.
Unit-2 - Information Gathering and Foot Printing 12 Hour
Technical Overview of Hacking - The Information-Gathering Process, The Information on a Company Web Site, Discovering Financial Information, Google Hacking, Exploring Domain Information Leakage, Tracking
an Organization’s Employees, Exploiting Insecure Applications, Using Basic Countermeasures. Port Scanning - Determining the Network Range, Identifying Active Machines, Mapping Open Ports, OS Fingerprinting,
Mapping the Network, Analyzing the Results Lab 4: Data Gathering and Footprinting on a Targeted Website Lab 5: Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation Lab 6: Attacking a Vulnerable
Web Application and Database
Unit-3 - Web and Database Attacks 12 Hour
Enumeration and Computer System Hacking -Windows Basics, Commonly Attacked and Exploited Services, Enumeration, System Hacking, Types of Password Cracking, Using Password Cracking, Using PsTools,
Rootkits, Covering Tracks, Wireless Vulnerabilities - The Importance of Wireless Security, A Brief History of Wireless Technologies, Working with and Securing Bluetooth, Working with Wireless LANs, Threats to
Wireless LANs, Wireless Hacking Tools, Protecting Wireless Networks, Web and Database Attacks - Attacking Web Servers , Examining an SQL Injection, Examining an SQL Injection, Vandalizing Web Servers,
Database Vulnerabilities Lab 7 : Password Guessing Attacks with Hydra, Password Cracking with John the Ripper, Password Cracking with Hashcat. Lab 8: Domain Password Audit Tool, Cloud Bucket Discovery,
The Many Uses of Netcat. Lab 9 - Metasploit Attack and Analysis, Client-side Exploitation with the Browser Exploitation Framework (BeEF), Windows System Resource Usage Database Analysis, Command
Injection Attack, Cross-Site Scripting Attack, SQL Injection Attack, Server-Side Request Forgery (SSRF) and Instance Metadata Service (IMDS) Attack

271
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Attacks and Malware Lifecycle 12 Hour
Sniffers session Hijacking and Denial of Service attacks - Malware-viruses and they function-worms and how they function works-significance of Trojans-Detection of Trojan and viruses, Trojan tools, distribution
methods-Trojan constructionkits-backdoors-convertcommunication-spyware-adware-scareware-rensomware-Lab 10 Identifying and Removing Malware on a Windows System.Lab11: Analyzing Network Traffic to
Create a Baseline Definition Lab12 :Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Unit-5 - Eless Security Technologies 12 Hour
Defensive Technologies and incident response - Defence in depth, Intrusion detection system-the purpose of firewalls- Honeypots Honeynets- the role of controls- security best practices- incident response and
defensive technologies- incident response- incident response plans- planning for disaster recovery- evidence handling and administration- requirements of regulated industries Lab 13: Investigating and Responding
to Security Incidents Lab14: Securing the Network with an Intrusion Detection System (IDS) Lab15: Defense Plan to Prevent Attacks

1. Hacker Techniques, Tools, and Incident Handling, 3rd Edition. By Sean-Philip Oriyan and 3. Digital forensics and incident response, johansen
Learning Michael G. Solomon. Released August 2020. Publisher(s): Jones & Bartlett Learning. 4. Hacker Techniques Training | Incident Handling Course | SANS SEC504
Resources 2. Joshua Wright Hacker Techniques Training | Incident Handling Course | SANS SEC504 2019 5. Hacking Exposed: Network Security Secrets and Solutions, Mcclure(Stuart),
Scambray(Joel)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.T.Madhan, Team Leader, Tata Consultancy Services, 1. Dr. S. Janakiraman, Associate Professor, Pondicherry University, 1. Dr. R. Naresh, SRMIST
siruseri Campus, Chennai, [email protected] [email protected]
2. Mrs.K.Saranya, IT Analyst, Tata Consultancy Services, 2. Dr. R.Shyamala, Associate Professor, Anna University College of 2. Dr. C.N.S. Vinoth Kumar, SRMIST
siruseri Campus, Chennai, [email protected] Engineering Tindivanam, [email protected]

272
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE399J COMPREHENSIVE LINUX FOR ALL E PROFESSIONAL ELECTIVE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce the key role of an Linux Operating system 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: insist the File system Management of a Linux Operating system

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: emphasize the importance of Server Management concepts of an Enterprise Linux Operating system

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: realize the significance of GIT repositories and databases

Environment &
Sustainability
CLR-5: comprehend the need of Security vulnerability in Linux Operating system

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify the need of an Linux Operating system 3 - - - - - - - - - - - - - -
CO-2: know the Process management functions of an Linux Operating system 2 - 2 - - - - - - - - - - - -
CO-3: understand the need of Users and Group Management in Linux Operating system - - 2 2 - - - - - - - - - - -
CO-4: find the significance of GIT repositories and databases - - - 2 3 - - - - - - - - - -
CO-5: recognize the essentials of File Management part of an Linux Operating system - - - 2 3 - - - - - - - - - -

Unit-1 - Starting with Linux 12 Hour


Understanding What Linux is- Exploring Linux History- Understanding How Linux Differs from Other Operating Systems- Understanding How Linux Distributions Emerged- Creating the Perfect Linux Desktop- Lab:
Ubuntu OS Installation on Virtual Machines- Starting With the Ubuntu Desktop Live Image- Handling Ubuntu Desktop- Using the Desktop- Understanding the Importance of Threads- Lab: Understanding Basic
Desktop Application Management in Ubuntu- Adding an Application Launcher- Managing Files and Folders-- Installing and Managing Additional Software- Lab: Knowing Advanced Desktop Application Management
in Ubuntu- Using Tools- Lab: Configuring Basic Tools in Ubuntu OS- Working with Shell in Ubuntu- Lab1: Getting Aquatinted with Different Types of Shell- Lab3: Basic Shell Management
Unit-2 - Gaining Access 12 Hour
Using the Root User Account-Exploring Administrative Commands, Configuration Files, and Log Files- Using Other Administrative Accounts- Lab: Implementing Privilege Escalation- Using Shell Variables, Expanding
Arithmetic Expressions Expanding Variables- Lab: Manipulating Environmental / Shell Variable- Getting Information About Commands and Help- Managing User Accounts in Ubuntu- User Management- Lab:
Managing Regular User Account-Group Management-Lab: Group Management- Moving Around the File system Ubuntu- File Management- Lab: Working with Basic File System- Permission Management- Lab:
Working With File System Permissions- Access Control Lists- Lab: Managing User and Group Permissions- Working with Text Files in Ubuntu
Unit-3 - File Manipulations 12Hour
Lab: Editing Text Files from Shell Prompt- Managing Running Processes- Process Management-Lab: Monitoring Process Activity- Writing Simple Shell Scripts- Understanding Shell Scripts- Lab: Implementing Basic
Shell Programs- Understanding Server Managing in RHEL - Install the Server RHEL - Lab: RHEL 8 Installation on Virtual Machine- Initial Server Configuration- Lab: Configuring and Verifying the Initial Server
Settings-Remote Server Management- Lab: RHEL Remote Server Management-Initial Server Configuration- Lab: Configuring and Verifying the Initial Server Settings-Remote Server Management-Lab: RHEL
Remote Server Management- File Transfer-Lab: Securely Coping Files Between Servers-Log Management- Lab1: Monitoring System Logs-Lab2: Recording and Managing Server Logs- Server Monitoring- Lab:
Monitoring the Health of the Server

273
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Managing Software in RHEL 12 Hour
Lab: System Software and Package Management- Administering Networking in RHEL - Lab: Examining and Configuring Network in Server- Starting and Stopping Services in RHEL - Lab: Managing Daemons and
Services in RHEL - Configuring a Web Server in RHEL- Lab: Managing a Basic Webserver- Advance Webserver Management-Lab: Advance Webserver Management- Secure Webserver-Lab: Securing the
Webserver Effectively- Managing Disks and File systems-Lab: Making Simple Partitions- Logical Volume Management- Lab: Implementing Logical Volume Management (LYM)- Configuring Samba Server in RHEL
- Lab: Deploy A Samba Share Directory- Configuring an NFS File Server In RHEL - Lab: Deploy a NFS Share Export- Introducing Container Technology
Unit-5 - Introduction to GIT 12Hour
Getting Started With GIT and its Architecture- Lab: Installing and Configuring GIT in RHEL - Remote Repositories- Lab: Exploring GIT Remote Repository- Branching and Merging- Lab: Learning and Exploring
Branches in GIT - Configuring Databases in Linux- Lab: Maria DB (MySQL) Installation and Configuration in RHEL -Mongo DB-Lab: Mongo DB Installation and Configuration in RHEL -Understanding Linux Security
OS- Lab: Kali Linux Installation on Virtual Machine- Description About Different Security Tools in Kali Linux-Hands-on Study on NMAP And METASPLOIT-Lab: Gathering Information Using NMAP - METASPLOIT -
Lab: Vulnerability Management Using METASPLOIT - Knowing Linux as Cloud Workhorse- Amazon Web Service (AWS- Lab: Operating and Managing an Ec2 Instance in AWS Cloud

1. Christopher Negus, Linux® BIBLE, John Wiley & Sons, Inc., Indianapolis, 3. Adrian Andrade, Fiona Allen, Victor Costea, Hervé Quatremain, Snehangshu Karmakar, Marc Kesler,
Learning Indiana, Canada, 2020, 10th edition Ed Parenti, Saumik Paul, Dallas Spohn, Red Hat Enterprise Linux 8.2 RH199 RHCSA Rapid Track
Resources 2. SUSE LLC, SUSE Linux Enterprise server 12 SPA Administration Guide, 4. Technical Content Development Team, Comprehensive Linux for IT Professionals, 2022, 1st edition
2021, version 1.3

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Stanley Raj M, IT solution Architect 1. Mr. Abdul Majeet Khan, Red Hat Certified Architect – Level V 1. Dr.G.Maragatham, SRMIST
2. Mr. SathishBabu R Cloud Architect 2. Ms. Aruna S, SRMIST

274
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE485T DATABASE SECURITY E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
demonstrate understanding of Fundamentals of Security in database technology with its security Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
architecture in modern computer systems in a typical enterprise
CLR-2:

Individual & Team Work


Engineering Knowledge
formulate a working definition of data warehouse and various geospatial models

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3:

Modern Tool Usage


identify hazards and vulnerabilities in matrix models

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: demonstrate the knowledge and skills for administration & protection of the active databases

Environment &
Sustainability
CLR-5: manage database security and reliability on secured software designs

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify fundamentals of security issues, requirements & Authentication - 2 - - 2 - - 2 - 2 - - - - 3
CO-2: obtain knowledge from data warehouse and different geospatial models - 2 - - 2 - - 2 - 2 - - - - 3
CO-3: gain information from different matrix models - 2 - - 2 - - 2 - 2 - - - - 3
CO-4: design different models & protection of the active databases - 2 - - 2 - - 2 - 2 - - - - 3
CO-5: enhance their knowledge of obtaining security software designs - 2 - - 2 - - 2 - 2 - - - - 3

Unit-1 – Security Issues in Database 9 Hour


Polyinstantiation, Integrity Lock, Sensitivity Lock, Security Models, Access Control (Grant & Revoke Privileges), Distributed Database Security, Outsourced Database and security requirements, Query Authentication
Dimension, Condensed RSA & Merkle Tree
Unit-2 - Security in Data Warehouse & OLAP 9 Hour
Star Schema, Snowflake Schema, Multi-Dimension range query, Data cube - Data leakage in Data Cube, Geospatial Database Security, Geospatial data models, Geospatial Authorization, Access Control Models:
Geo-RBAC & Geo- LBAC, Database Watermarking & Attacks on Watermarking
Unit-3 - Introduction to Access Matrix Model 9 Hour
Take Grant Model, Acten Model PN Model, Harston Model, Hsiao's Model, Fernandez Model, Bell Lapadula's Model, Biba's Model & Dion's Model
Unit-4 – Database Security Models 9 Hour
Sea View Model, Jajodia Model, Sandhu's Model, The Orion Model, Jajodia Model, Kogan's Model, Sorion Model, A Model for Frame based systems & A Model for the Protection of Active Database
Unit-5 - Security Software Design 9 Hour
A Methodological Approach to Security Software Design, Secure DBMS Design Security Packages, Database Security Design, Retiss System, ASES System discovery, Bussolati AND Martella's Model & Case
Study.

275
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Database Security and Auditing, Hassan A. Afyouni, India Edition, CENGAGE Learning, 2009. 4. Bhavani Thuraisingham, Database and Applications Security: Integrating Information,
Learning 2. Database Security, Castano, Second edition, Pearson Education. Security and Data Management, CRC Press, Taylor & Francis Group, 2005.
Resources 3. Michael Gertz and Sushil Jajodia (Editors), Handbook of Database Security: Applications and 5. Database security by Alfred basta, Melissa zgola, CENGAGE learning.
Trends, ISBN-10: 0387485325. Springer, 2007. 6. Handbook of Database Security: Applications and Trends. (2008). Germany: Springer US.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Elaiyaraja K, Eagle Software India Pvt Ltd. 1. Dr. Noor Mahammad, IIITDM 1. Dr. A. Suresh, SRMIST

276
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE486T OPERATION SYSTEM SECURITY E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline the fundamentals of efficient security operations in a center 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate the basics of Infrastructure and Organizational Structures

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: emphasize the most valuable resource person in an organization

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: explain the working of Daily Operations, Training and Metrics

Environment &
Sustainability
CLR-5: acquire knowledge on the concepts of Intelligence and Outsourcing

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the basic concepts of operation system security on centers 2 - - - - - - - - - - - - - -
CO-2: identify infrastructural requirements, structures, and operational procedures - - 3 - - - - - - - - - - - -
CO-3: classify the operational security functions and management procedures - - 3 - 3 - - - - - - - - - 3
CO-4: identify and acquire knowledge on daily operations and trainings 2 - - - 3 - - - - - - - - - 3
CO-5: understanding the concept of system metrics, thresholds, outsourcing and deliverables 2 - 3 - 3 - - - - - - - - - -

Unit-1 - Operating System Security 9 Hour


Defining an operations Center, Purpose of the Operation Center, Emergency Operations Center, Mission Operations Center, Threat Operations Center, Network Operations Center, Let Us Build a SOC, Logs,
Events, Alerts, False Positive, True Positive, False Negative , True Negative, Incidents , Problems, Define your Requirements, Identify your Customers: Internal versus External Customers, Human Resources,
Legal, Audit, Engineering /R&D, IT, External Customers, Customer Objectives, Service level Agreements, Build and Document your Use cases.
Unit-2 - Infrastructure Security 9 Hour
Organisational Infrastructure – Operations Infrastructure, Support Infrastructure , Organisational Security Infrastructure, Perimeter Defences, Network Defences, Host Defences, Application Defences Data Defences,
Policies and Procedures, Security Architecture , Siem/Log Management, Operation Center Infrastructure Ticketing Systems, Building the Ticket System, Subject, Parsed Values from Events, Time Ticket Created,
User |Group | Queue, Source(SIEM, Email, Phone ), Category, Status, Reason Codes, Acknowledgement/Ticket Feedback, Workflow and Automation, Portal Interference, Mobile Devices, Support Infrastructure,
Physical, Private SOC Network, Video Projectors, Labs. Different Reporting Lines, Legal, CISO, CIO, Compliance, SOC Organisation, Engineering, Security Architecture, Security Monitoring and Analysis,
responsibility, Authority, Fulfilling needs.
Unit-3 - Most valuable Resource 9 Hour
Operational Security, Culture, Personality, Core skill sets, Analysis, Security Analyst- Job Description Security Engineering, Security Operation Engineer- Job Description, Security Architect, Security Architect-Job
Description, SOC Team Lead, SOC Team Lead – Job Description, SOC Management, SOC Manager- Job Description , SOC Games, Special Projects, Do not Forget your People.
Unit-4 - Operations 9 Hour
Problem and change Event Communications- Master stage Logs, Shift turnovers, Daily Operations Calls, Critical Bridges, IR, Detection, Confirmation, Analysis, Containment, Recovery, Review, Communication
Plan, Regular Workshops, Checklists, Shift Schedules, Types of Shift Schedules, Other Shift Options, Follow the Sun, Shift Rotation, Dealing with Absenteeism. Internal Functional Training, Internal Skill set Training
Playbooks and Runbooks, Job Task Qualification Training, Tools and Product Training, Formal Training and Certifications , Schools and Universities, vendor Training , OJT, Training Plans, SOC shift Operations,
Leaders, Customer Notifications, SOC Phones, Progression and Visibility, Training Exercises.
277
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Outsourcing 9 Hour
Heads Up Display, Supervisor Metrics, Vulnerabilities, Vulnerability Prioritizing, Base CVSS2 Threshold, Temporal CVSS2 Threshold, Asset Prioritizing as a Part of Metrics, Historical Monitoring of Patches. Know
Thyself, Known IP Space, Know Thy Enemy, Blacklists, Block Listing Projects, Other Types of Lists, Organisational and Industry Partners, Proactive Activity Monitoring. Types of MSSPs, - Strategic Partners, Pure
Play Providers, Boutique Providers. Advantages of MSSP Outsourcing- Cost, Organisational, Enhanced Capabilities, SLA, Documentation, Disadvantages to MSSP Outsourcing, and Large Numbers of Customers.
Lack of Dedicated Resources, Data Storage Issues, Costs, Quality of Work and Staffing, How the Services will be Delivered, people, Size Verses Experience, Service Execution, Tools, Similar Versus Larger MSSP,
Security, DR, Exit Strategy, MSSP Selection, Providing the Service, Testing Your MSSP.

1. David Nathans Designing and Building a Security Operations Center, Elsevier Science - Syngress. 4. Robert H. Deatherage, Jr. , Security Operations an Introduction to Planning and
Learning 2. Gregory Jarpey and Scott McCoy, Security Operations Center Guidebook A Practical Guide for a Conducting Private Security Details for High-Risk Areas · Taylor & Francis - 2021
Resources Successful SOC · Elsevier Science- 2017. 5. Joseph Muniz, Gary McIntyre, Nadhem AlFardan, Security Operations Center,
3. Robert McCrie, Security Operations Management · Elsevier Science - 2011 Building, Operating, and Maintaining Your SOC · Pearson Education- 2015.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr S, Venkata Prasad, Tata Consultancy Services, Chennai 1. Dr. G. Srinivasan, IIITDM, Chennai 1. Dr.S.Murugaanandam, SRMIST.

278
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE487T CYBERWARFARE E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
describe the relationships between cyber warfare, information assurance, information operations, and Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
network-centric warfare
develop and maintain an effective cybersecurity workforce prepared to support various cyber warfare
CLR-2:

Environment & Sustainability


activities

The engineer and society


Conduct investigations of
apply international cybersecurity policy and doctrine to develop frameworks for effective deterrence and

Individual & Team Work


Engineering Knowledge
CLR-3:

Design/development of

Project Mgt. & Finance


management of operational risk

Modern Tool Usage

Life Long Learning


complex problems
define technical and operational requirements for command & control, situational awareness, and

Problem Analysis
CLR-4:

Communication
decision support systems for operational cybersecurity organizations
CLR-5: describe trends in the development of cyber warfare capabilities from an international perspective

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the cyber war and its importance, battlefield of cyber war - - 2 - - - - 2 - - - - - - -
CO-2: analyze the organized crimes in cyberspace and the role of cyber in Military Doctrines - - - - - - - 2 - - - - - - -
CO-3: manage the development of cyber capabilities to meet weaponization standards - - 2 - - - - - - - - - - - 3
CO-4: identify and apply decision frameworks for ethical and legal concepts in the context of cyber warfare - - - - - - - 2 - - - - - - 3
develop and maintain an effective cybersecurity workforce prepared to support various cyber warfare
CO-5: - - 2 - - - - - - - - - - - -
activities with the legal status

Unit-1 - Cyber Warfare, Threatscape and Cyberspace Battlefield 9 Hour


What is Cyber Warfare? – What is Cyber Warfare? Have We Seen a Cyber War? Why Cyber Warfare Is Important? Introduction to Cyber Warfare Threatscape: definition of cyberwar, motivation, attackers, threats,
Attack Methodology with the Tools and Techniques Used to Execute Them, Defense in Depth—How Organizations Defend Today (Defensive Mountain Range), What the Threat Is After (What We Should Focus on
Defending). The Cyberspace Battlefield - Boundaries in Cyber Warfare, Where Cyber Fits in the War-Fighting Domains, Review of the Threat Actors, Fielding Systems at the Speed of Need.
Unit-2 - Cyber Doctrine, Warrior and Accessing the Problem 9 Hour
Cyber Doctrine - Current U.S. Doctrine, Sample Doctrine/Strategy from Around the World, Key Military Principles That Must Be Adapted to Cyber Warfare, Guidance and Directives, Operations and Exercises. Cyber
Warriors - What Does a Cyber Warrior Look Like? Differences from Traditional Forces, Present Cyber Warfare Forces, Staffing for Cyber War. Assessing the Problem - The Complex Domain of Cyberspace, Cyber
Warfare in the 20th and 21st Centuries, China, Israel, Russia, The Second Russian-Chechen War (1997–2001), The Estonian cyber-attacks (2007), The Russia-Georgia War (2008), Iran, North Korea, Cyber
Espionage, Titan Rain, Cyber Crime, Future Threats, Increasing Awareness, Critical Infrastructure, The Conficker Worm: The Cyber Equivalent of an Extinction Event? Africa: The Future Home of the World’s Largest
Botnet? The Way Forward.
Unit-3 - Weapons – Logical, Physical and Psychological 9 Hour
Logical Weapons - Reconnaissance Tools, DNS, Scanning Tools, Access and Escalation Tools, Exfiltration Tools, Sustainment Tools, Assault Tools, Obfuscation Tools. Physical Weapons - How the Logical and
Physical Realms Are Connected? Infrastructure Concerns, Supply Chain Concerns, Tools for Physical Attack and Defense. Psychological Weapons - Social Engineering Explained, How the Military Approaches SE,
How the Military Defends Against SE.

279
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Computer Network Exploitation, Defense and Non-State Actors 9 Hour
Computer Network Exploitation - Intelligence and Counter-Intelligence, Reconnaissance, Surveillance. Computer Network Attack - Waging War in the Cyber Era, The Attack Process. Computer Network Defense -
What We Protect, Security Awareness and Training, Defending Against Cyber Attacks. Non-State Actors in Computer Network Operations - Individual Actors, Corporations, Cyber Terrorism, Organized Cyber Crime,
Autonomous Actors - The Rise of the Nonstate Hacker.
Unit-5 - Legal System Impacts and Status of Cyber Warfare, Challenges and Future of Cyber War 9 Hour
Legal System Impacts - Legal Systems, Key U.S. Laws, Privacy Impacts, Digital Forensics. Ethics - Ethics in Cyber Warfare, Bellum Iustum (Just War Theory). The Legal Status of Cyber Warfare - Cyberspace
Challenges - Cybersecurity Issues Defined, Interrelationship of Cybersecurity Challenges, Way Ahead. The Future of Cyber War - Emerging Trends, Trends Driving Where We Will Go

1. Cyber Warfare, 2nd Edition, by Jason Andress, Steve Winterfeld, Released October 4. Information Operations - Doctrine and Practice: A Reference Handbook, Christopher Paul, Praeger
2013, Publisher(s): Syngress, ISBN: 9780124166332. Security International, 2008, ISBN: 0275995917,
2. Inside Cyber Warfare, 2nd Edition, Jeffrey Carr, Released December 2011, 5. Law, Policy, and Technology: Cyberterrorism, Information Warfare and Internet Immobilization,
Learning
Publisher(s): O'Reilly Media, Inc.ISBN: 9781449310042 Pauline C. Reich, and Eduardo Gelbstein, IGI Global, 2012, ISBN: 1615208313
Resources
3. The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in 6. Information Warfare and Security, Dorothy Denning, Addison Wesley Professional, 1998, ISBN:
Theory and Practice, Steve Winterfeld and Jason Andress, Elsevier, 2012, ISBN: 0201433036
978012404737.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. N. Arun, Senior Software Engineer, Quick Heal 1. Mr.Vigneshwaran P, SRMIST

280
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE488T HACKER MIND: PROFILING THE IT CRIMINAL E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: compare and contrast the differences between digital evidence and traditional evidence 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: critically evaluate standards and good practices for digital evidence and digital crimes

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: describe and critique digital crime process models

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: discuss data and identify data sources

Environment &
Sustainability
CLR-5: discuss the ways in which digital evidence is authenticated

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understanding the Concept of Cyber Criminology - - 2 - - - - - - - - - - - -
identify the challenges faced nationally and internationally at combating cybercrime, and the steps being
CO-2: - - - - - - - 2 - - - - - - -
taken by organizations and law enforcement to address these challenges
CO-3: identifying the Contemporary Forms of Crimes - - 2 - - - - 2 - - - - - - 3
CO-4: know psychology of cyber criminals - - 2 - - - - - - - - - - - 3
CO-5: take what they have learned in class and apply it to cybercrime-related current events - - 2 - - - - - - - - - - - -

Unit-1 - Principles and Concepts of Cyber Criminology 9 Hour


Crime, Tort, Misdemeanour, Cyber Space, Cyber Crime, Cyber Criminology, Information Security, Penetration Testing, Incident Response, GRC, etc.- Conventional crimes vs. Cyber Crimes.
Unit-2 - Contemporary Forms of Crimes 9 Hour
White Collar Crimes, Economic Offences, Organized Crimes, Terrorism, Crime and Media and other contemporary forms of crimes.
Unit-3 - Psychology of Cyber Criminals 9 Hour
Types of Cyber Criminals – Modus Operandi of Cyber Criminals – Profiling of Cyber Criminals - Tools and Techniques adopted by Cyber Criminals – Psychological theories relating to cyber criminals.
Unit-4 - Cyber Crime 9 Hour
Sociological and Criminological Perspectives – Causes of Cyber Crimes - Criminological Theories and Cyber Crime – Routine Activity Theory, Social Learning Theory, Differential Association Theory, Differential
Opportunity Theory, Media and Crime and latest theories and other related theories.
Unit-5 - Crime Prevention 9 Hour
Crime and sense of security - Social control and crime prevention - Community and crime prevention - Contemporary crime prevention strategies Tutorial The Role of Criminal Justice Administration and Cyber
Crimes a. Police – Organizational structure of Police in India – Different wings in the States and Districts and their functions - Police & Law Enforcement – F.I.R. – cognizable and non-cognizable offences, bail able
and non-bail able offences – arrest , search, seizure – Interrogation of suspects and witnesses – charge sheet – Cybercrime cells – structure & investigation of cybercrime cases . b. Judiciary - Different types of
courts – Cyber Appellate Court / Tribunals / Powers – Proceedings in the court before trial, after trial, plea of guilty, sentencing. c. The Role of N.G.O.s in the Prevention of Cyber Crimes d. The Role of Victims of
Cyber Crimes in the Criminal Justice Administration

281
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Clifford, Ralph. 2021. Cybercrime: The Investigation, Prosecution and Defense of a 3. Holt, Thomas. 2019. Crime On-Line: Correlates, Causes and Context. Second Edition. Carolina
Learning
Computer-Related Crime. Second Edition. Carolina Academic Press. Academic Press..
Resources
2. McQuade, Samuel. 2006. Understanding and Managing Cybercrime. Pearson 4. Yar, Majid. 2013. Cybercrime and Society. Second Edition. Sage Publications.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Venkata Prasad S, TATA consultancy services, 1. Dr. Abhishek Srivastava, [email protected], 1. Dr.M B Mukesh Krishnan, SRMIST
svenkataprasad,@yahoo. com CSE, IIT, Indore.
2. Dr. A. Amuthan, [email protected],
Pondicherry Engineering College, Pondicherry.

282
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE489T MOBILE AND WIRELESS SECURITY E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline the fundamentals Mobile and Wireless Networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate the importance of security and explain about Mobile Security

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: introduce and explain about Wifi, Bluetooth security in Wireless Networks

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: explain WiMAX and LTE Security in Wireless Networks

Environment &
Sustainability
CLR-5: implement about the Security of Downloadable Applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understanding the modern concept and foundation of Mobile security 2 - 3 - 3 - - - - - - - - - -
CO-2: identify and classify various next generation networks - - 3 - - - - - - - - - - - -
CO-3: analyze various sources of vulnerabilities from Mobile 2 - 3 - - - - - - - - - - - 3
CO-4: analyze various sources of vulnerabilities from Wireless Networks - - 3 - 3 - - - - - - - - - 3
CO-5: create network security attacks and its countermeasures - - - - 3 - - - - - - - - - -

Unit-1 - Introduction to Mobile and Wireless Networks 9 Hour


Mobile Cellular Networks – (Generation Networks), 802.11 Standards –802.11,802.15, 802.16, 802.20, 802.21, IEEE wireless networks, Mobile Internet networks, Attacks and defence strategies on Cellular networks,
Security Issues in Mobile Communication: Mobile Communication History, Security – Wired Vs Wireless, Security Issues in Wireless and Mobile Communications, Security Requirements in Wireless and Mobile
Communications, Security for Mobile Applications, Advantages and Disadvantages of Application – level Security
Unit-2 - Mobile Security 9 Hour
Basics on security, Secure communication protocols, Importance of Authentication and Authorization, Challenges of Cybersecurity, Incident Response Process, Security risks in Mobile, Security in the GSM, GPRS
security , 3G security ,Android Architecture, and Security Model for Android, Fundamentals of Android Development, Android Rooting, Intercepting Android Traffic, Attacks on Android, and Security Model for iOS,
Case Studies on Mobile Security
Unit-3 - Wireless Security 9 Hour
Wi-Fi Security: Introduction, Attacks on wireless networks: Active, passive attacks, DoS attacks, TCP, Trojan and Dictionary Attacks, Security in the IEEE 802.11 standard, Security in 802.1x, Security in 802.11i,
Authentication in wireless networks, Layer 3 security mechanisms. Bluetooth Security: Introduction, Bluetooth technical specification, Bluetooth security
Unit-4 - WiMAX and LTE Security 9 Hour
Introduction, WiMAX architecture and OFDM, Security risks involved in 802.16-2004, Security risks involved in 802.16e Security in GSM, UMTS, GPRS, VoIP security, LTE security
Unit-5 - Security of Downloadable Applications 9 Hour
Introduction, Security policy, The implementation of a security policy, Execution environments for active contents, Validation of active contents, Detection of attacks

283
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Hakima Chaouchi, Maryline Laurent-Maknaviciu Wireless and Mobile Network Security, Wiley- 5. https://onlinecourses.nptel.ac.in/noc21_cs16/preview
ISTE, 2013. 6. https://blog.rsisecurity.com/what-is-the-mobile-security-framework/
Learning 2. M. Au, R. Choo and G. Kessler, Mobile security and privacy. Cambridge, MA: Syngress, 2017. 7. https://wimaxforum.org/
Resources 3. J. Joshi, Network Security. New York: Elsevier, 2009. 8. https://www.coursera.org/lecture/security-awareness-training/mobile-devices-and-
4. S. AHMADI, MOBILE WIMAX. [Place of publication not identified]: ELSEVIER ACADEMIC security-EMjmM
Press, 2016.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Venkata Prasad S, TATA consultancy services, 1. Dr. Abhishek Srivastava, [email protected],CSE,IIT, Indore. 1. Dr.Mary Subaja Christo, SRMIST
svenkataprasad,@yahoo. com
2. Dr. A. Amuthan, [email protected], Pondicherry Engineering
College, Pondicherry.

284
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE490J WINDOWS AND LINUX INTERNALS E PROFESSIONAL ELECTIVE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic concepts of windows operation system tools and terminologies 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: exploring the operating system architecture and kernel drivers

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: classify the operational management services in windows operating system

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: acquire knowledge on Linux operating system basics

Environment &
Sustainability
CLR-5: learn the technical aspects and to apply Linux operating system kernel operations and file systems

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: inspect and apply the basic concepts of windows operation system tools and terminologies - - 2 - - - - 2 - - - - - - -
CO-2: recognize and clarify the operating system architecture and kernel drivers - - 2 - - - - - - - - - - - -
demonstrate foundation knowledge of the operational management services in windows operating
CO-3: - - - - - - - 2 - - - - - - 3
system
CO-4: inspect and apply the basic concepts on Linux operating system basics - - 2 - - - - - - - - - - - 3
CO-5: exploring the Linux operating system kernel operations and file systems - - - - - - - 2 - - - - - - 3

Unit-1 - Operating System Security 12 Hour


Concepts and Tools, Windows Operating System Versions, Foundation Concepts and Terms, Windows API, Services, Functions, and Routines, Processes, Threads, and Jobs, Virtual Memory, Kernel Mode vs.
User Mode, Terminal Services and Multiple Sessions, Objects and , Security ,Registry , Unicode , Digging into Windows Internals , Reliability and Performance Monitor , Kernel Debugging , Windows Software
Development Kit ,Windows Driver Kit , Sysinternals Tools.
Unit-2 - Windows Architecture 12 Hour
System Architecture, Requirements and Design Goals, Scalability, Differences Between Client and Server Versions, Operating System Model, Architecture Overview, Portability , Symmetric Multiprocessing ,
Checked Build, Key System Components , Environment Subsystems and Subsystem DLLs , Ntdll.dll ,Executive , Kernel. , Hardware Abstraction Layer, Device Drivers,
Unit-3 - Windows Management 12 Hour
Management Mechanisms , The Registry , Viewing and Changing the Registry , Registry Usage , Registry Data Types , Registry Logical Structure,Transactional Registry (TxR) , Monitoring Registry Activity , Registry
Internals , Services , Service Applications ,The Service Control Manager ,www.it-ebooks.info viii Table of Contents Service Startup , Startup Errors ,Accepting the Boot and Last Known Good, Service Failures ,
Service Shutdown , Shared Service Processes , Service Tags, Service Control Programs, Windows Management Instrumentation , Providers , The Common Information Model and the Managed Object Format
Language. , Class Association, WMI Implementation. , WMI Security, Windows Diagnostic Infrastructure. ,WDI Instrumentation, Diagnostic Policy Service ,Diagnostic Functionality
Unit-4 - Linux Operating System 12 Hour
Booting, Process and Interrupt Management, Virtual Filesystem (VFS, Linux Page Cache, IPC mechanisms.,Booting, Building the Linux Kernel Image, Booting: Overview, Booting: BIOS POST, Booting: bootsector
and setup, Using LILO as a bootloader, High level initialization, SMP Bootup on x86, Freeing initialisation data and code, Processing kernel command line, Process and Interrupt Management., Task Structure and
Process Table, Creation and termination of tasks and kernel threads,,Scheduler, Linux linked list implementation, Wait Queues, Kernel Timers., Bottom Halves, Task Queues.,Tasklets, ,, How System Calls Are
Implemented on i386 Architecture, Atomic Operations

285
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Linux Kernal 12 Hour
Linux Versus Other Unix-Like Kernels, Hardware Dependency, Linux Versions, Basic Operating System Concepts, An Overview of the Unix File system, An Overview of Unix Kernels , Memory Addressing, Memory
Addresses , Segmentation in Hardware, Segmentation in Linux , Paging in Hardware , Paging in Linux , Processes, Processes, Lightweight Processes, and Threads , Process Descriptor , Process Switch , Creating
Processes , Destroying Processes

1. Solomon, David A., Mark E. Russinovich, and Alex Ionescu. Windows internals. 3. Bovet, Daniel P., and Marco Cesati. Understanding the Linux Kernel: from I/O ports to process
Microsoft Press, 2009. management. “O’Reilly Media, Inc.", 2005.
Learning
2. Yosifovich, Pavel, David A. Solomon, and Alex Ionescu. Windows Internals, Part 1: 4. Mohanta, Abhijit, and Anoop Saldanha. "Windows Internals." Malware Analysis and Detection
Resources
System architecture, processes, threads, memory management, and more. Microsoft Engineering. Apress, Berkeley, CA, 2020. 123-162.
Press, 2017. 5. Mauerer, Wolfgang. Professional Linux kernel architecture. John Wiley & Sons, 2010.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr S, Venkata Prasad, TCS, Chennai 1. Dr. T Veera kumar, ECE, NIT, GOA. 1. Dr S Murugaanandam, SRMIST

286
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE491T CYBER CRIME AND DIGITAL FORENSICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: study about the Cyber Crime 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: learn and understand cybercrimes occurrence

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: study the fundamentals of Computer Forensics

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn, analyze and validate Forensics Data

Environment &
Sustainability
CLR-5: study the tools and tactics associated with Cyber Forensics

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understanding concepts related to cyber world and cyber law in general 2 - 3 - 3 - - - - - - - - - -
CO-2: develop competitive edge on various facets of cyber crimes - - 3 - - - - - - - - - - - -
CO-3: understand data and identify data sources 2 - - - 3 - - - - - - - - - 3
CO-4: understand and able to classify digital evidence 2 - 3 - - - - - - - - - - - 3
CO-5: compare and contrast the differences between digital evidence and traditional evidence - - - - 3 - - - - - - - - - -

Unit-1 - Criminal Law and Prevention 9 Hour


Introduction to Criminal aw, Nature of Jurisprudence, Participants and Steps in the Criminal Justice Process, Theories of Punishment I: Retribution and Prevention, Theories of Punishment II: Rehabilitation and
Incapacitation, Sentencing and Punishment, Correlation between law and social change, Legal evolution and social complexity, Symbolic and instrumental uses of law, Problems in the study of impact and
effectiveness.
Unit-2 - Cyber Law and IT Act 2000 9 Hour
Introduction to Cyber Law, Evolution of the Information Technology Act, Genesis and Necessity, Salient features of the Information Technology Act, 2000, Various authorities under Information Technology act,
Powers. Penalties & Offences, Amendments, Cyber Space Jurisdiction, Jurisdiction Issues under IT Act, 2000, Traditional Principles of Jurisdiction, Extra Terrestrial Jurisdiction, Case Laws on Cyber Space
Jurisdiction.
Unit-3 - Cyber Forensics Fundamentals 9 Hour
Cyber Forensic Basics, Introduction to Cyber Forensics, Storage Fundamentals, File System Concepts, Data Recovery, Operating System, Software, Basic Terminology, Applications
Unit-4 - Recovery Policies 9 Hour
Data and Evidence Recovery, Introduction to Deleted File Recovery, Formatted Partition Recovery, Data Recovery Tools, Data Recovery Procedures and Ethics, Preserve and safely handle original media, Document
a "Chain of Custody", Complete time line analysis of computer files based on file creation, file modification and file access, Recover Internet Usage Data, Recover Swap Files/Temporary Files/Cache Files, Introduction
to Encase Forensic Edition, Forensic Tool Kit (FTK), Use computer forensics software tools to cross validate, findings in computer evidence-related case.
Unit-5 - Investigation Models 9 Hour
Cyber Forensics Investigation and Decryption methods, Introduction to Cyber, Forensic Investigation, Investigation Tools, e-Discovery, Digital Evidence Collection, Evidence Preservation, Fundamentals of File
Systems, Network Forensics Artefacts, Mobile Device Forensics, Digital Forensics writing Reports, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail Recovery, Encryption, Search and Seizure of Computers,
Recovering deleted evidences, Password Cracking
287
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. David J. Loundy, Computer Crime, Information Warfare, and Economic Espionage, 4. Orin S. Kerr, Computer Crime Law: American Casebook Series (2016) (ISBN: 0314144005).
Carolina Academic Press (2018) (ISBN: 0890891109). 5. Ralph D. Clifford, Cybercrime: The Investigation, Prosecution and Defense Of A Computer-Related
Learning 2. Jack Balkin, Et Al. Eds., And Cybercrime: Digital Cops In A Networked World (Nyu Crime (Second Edition 2016) (ISBN: 0890897239).
Resources Press 2017) (ISBN: 0814799833). 6. Samuel C. Mcquade, Iii, Understanding and Managing Cybercrime (2016) (ISBN: 020543973x).
3. Orin S. Kerr, Computer Crime Law: American Casebook Series (2016) (ISBN:
0314144005).

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Balan C, Scientist F, CDAC, [email protected] 1. Dr. S. Janakiraman, Associate Professor, Pondicherry University, 1. Dr. C.N.S.Vinoth Kumar SRMIST
[email protected]
2. Mr.E.Balaji, IT Analyst, Tech Mahindra 2. Dr. R.Shyamala, Associate Professor, Anna University College of 2. Dr.R.Naresh, SRMIST
Engineering Tindivanam, [email protected]

288
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE492T CYBER CRIMES AND CYBER SECURITY E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce the cyber world and cyber law in general 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes

Environment & Sustainability


CLR-2: explain about the various facets of cyber crimes

The engineer and society


Conduct investigations of
enhance the understanding of problems arising out of online transactions and provoke them to find

Individual & Team Work


Engineering Knowledge
CLR-3:

Design/development of

Project Mgt. & Finance


solutions

Modern Tool Usage

Life Long Learning


complex problems
exhibit knowledge to secure corrupted systems, protect personal data, and secure computer networks

Problem Analysis
CLR-4:

Communication
in an organization
CLR-5: practice with an expertise in academics to design and implement security solutions

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understanding concepts related to cyber world and cyber law in general - 2 2 - - - - 2 - - - - - - -
CO-2: develop competitive edge on various facets of cyber crimes - 2 - - - - - 2 - - - - - - -
CO-3: analyze and evaluate the cyber security needs of an organization - - 2 - - - - - - - - - - - 3
CO-4: measure the performance and troubleshoot cyber security systems - 2 - - - - - 2 - - - - - - 3
implement cyber security solutions and use of cyber security, information assurance, and cyber/computer
CO-5: - - 2 - - - - 2 - - - - - - 3
forensics software/tools

Unit-1 - Criminal Law and Judicial Procedure 9 Hour


Introduction to Criminal Law, History of criminal law, Penology and Treatment of Offender, Judicial process as an instrument of social ordering, Indian Penal Code, Indian Evidence Act, Legislature and Judiciary,
Nature, content and justiciability, Directive Principles of State Policy, Inter relationship between Fundamental Rights and DPSP, Definitions under Code of Criminal Procedure -1973
Unit-2 - Cyber Law and IT Act 2000 9 Hour
Introduction to Cyber Law, Evolution of the Information Technology Act, Genesis and Necessity, Salient features of the Information Technology Act – 2000, Various authorities under Information Technology act,
Powers. Penalties & Offences, Amendments, Cyber Space Jurisdiction, Jurisdiction Issues under IT Act, 2000, Traditional Principles of Jurisdiction, Extra Terrestrial Jurisdiction, Case Laws on Cyber Space
Jurisdiction
Unit-3 - Security Risks and Threats 9 Hour
Security Threat Management, Risk Assessment, Forensic Analysis, Security threat correlation, Threat awareness, Vulnerability sources and assessment, Vulnerability assessment tools, Threat identification, Threat
Analysis, Threat Modeling, Model for Information Security Planning.
Unit-4 - Security Policies 9 Hour
Security Elements, Authorization and Authentication, types, policies and techniques, Security certification, Security monitoring and Auditing, Security Requirements Specifications, Security Policies and Procedures,
Firewalls, IDS, Log Files, HoneyPots
Unit-5 - Trusted Security Models 9 Hour
Access control, Trusted Computing and multilevel, Security models, Trusted Systems, Software security issues, Physical and infrastructure security, Human factors, E-Mail Recovery, Encryption, Email, and Internet
use policies
289
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Swiderski, Frank and Syndex, “Threat Modeling”, Microsoft Press, 2018. 3. Joseph M Kizza, “Computer Network Security”, Springer Verlag, 2019
Learning
2. William Stallings and Lawrie Brown, “Computer Security: Principles and Practice”, 4. Thomas Calabres and Tom Calabrese, “Information Security Intelligence: Cryptographic Principles
Resources
Prentice Hall, 2018. & Application”, Thomson Delmar Learning, 2018.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Balan C, Scientist F, CDAC, [email protected] 1. Dr. S. Janakiraman, Associate Professor, Pondicherry University, 1. Dr. C.N.S.Vinoth Kumar, SRMIST
[email protected]
2. Mr.E.Balaji, IT Analyst, Tech Mahindra 2. Dr. R.Shyamala, Associate Professor, Anna University College of 2. Dr.P.Madhavan SRMIST
Engineering Tindivanam, [email protected]

290
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

UNDERGRADUATE/ INTEGRATED POST


GRADUATE DEGREE PROGRAMMES
(With exit option of Diploma)

(Choice Based Flexible Credit System)

Regulations 2021

Volume – 11G
(Syllabi for Computer Science and Engineering w/s in
Information Technology Programme Courses)

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

291
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Core Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

292
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC314P BIG DATA ESSENTIALS C PROFESSIONAL CORE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: identify the basics of big data and hadoop 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: demonstrate the tools and techniques in big data

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: inspect the query language based on big data application

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: interpret classification and clustering in big data application

Environment &
Sustainability
CLR-5: experiment the Big data Visualization tools

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire knowledge on the basics of big data 2 - - 3 - - - - - - - - - - 2
CO-2: examine the tools and techniques using Hadoop, HDFS, and Map Reduce - - - 3 3 - - - - - - - - - 3
CO-3: build any database for the application in big data 2 - - 3 - - - - - - - - - - 3
CO-4: apply different classification and clustering algorithms using data sets in an application - - - 3 - - - - - - - - - - 3
CO-5: analyze the Visualization techniques in big data 2 - - 3 3 - - - - - - - - - 3

Unit-1 - Introduction 9 Hour


Introduction to Big Data, Impact of Big Data, Parallel Processing, and Data Parallelism, Tools of Big Data, Introduction to the Hadoop Ecosystem, Introduction to MapReduce, The Hadoop Ecosystem/Common
components: Introducing HDFS, Hive, HBase, and Spark, other modules, Installing Hadoop
Unit-2 – Hadoop Distributed File System 9 Hour
Features of HDFS, HDFS Commands, Retrieving file data from HDFS using Python Snakebite, Deleting files in HDFS using Python Snakebite, Map Reduce and Spark RDD Big Data, Working with HDFS, Working
with HBase, Difference between HDFS and HBase, Hadoop Word Count using Map Reduce, Matrix Multiplication using Map Reduce
Unit-3 – Pig Programming 9 Hour
Introduction to Pig, Parallel processing using Pig, Pig Latin-Input and output, Hive: Introduction, data types and file formats, QL-data definition, data manipulation, QL views, indexes, Hive queries with partitioning.
Unit-4 - Spark Framework 9 Hour
GPU Computing, CUDA Programming model, Multiplication in CUDA, CUDA Memory model, Shared memory matrix multiplication Writing Spark application, Spark programming in R, Scala, Python, Java, Streaming
application, Classification and Clustering in Big data, K-Means clustering, Decision Tree Classification, Naive Bayes Classification.
Unit-5 – Big Data Visualization 9 Hour
Introduction to big data visualization, Tree Maps, Maps, Gauge, Sunburst, Different visualization tools, Creating Visualization in Tableau, Different visualization methods in Tableau

293
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Sima Acharya, Subhashini Chellappan,” BIG Data and Analytics” Wiley Publication, 2020. 5. Thomas Erl, “Big Data Fundamentals-Concepts, Drivers and Techniques”, Pearson
2. Michael Minelli,Michele Chambers, AmbigaDhiraj, “BigData, BigAnalytics - Emerging publication, 2016.
Learning
Business Intelligence and Analytic Trends for Today's Businesses”, Wiley Publication, 2018 6. Kyle Banker, PiterBakkum, Shaun Verch,” MongoDB in Action” Dream tech Press
Resources
3. Achari, Shiva “Hadoop Essentials” Birmingham, UK: Packt Publishing. 2015. publication 2016.
4. Tom White, “HADOOP: The Definitive Guide”, O Reilly 2012.

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Project Based Learning Report and Viva Voce Final Examination
Bloom’s
CLA-1 Average of unit test CLA-2 (20%) (0% weightage)
Level of Thinking
(20%) (60%)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% - 15% - -
Level 2 Understand 25% - - 20% - 20% - -
Level 3 Apply 30% - - 25% - 25% - -
Level 4 Analyze 30% - - 25% - 25% - -
Level 5 Evaluate - - - 10% - 10% - -
Level 6 Create - - - 5% - 5% - -
Total 100 % 100% 100% -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Kumanan P, Project Manager, CTS, Chennai 1. Dr.V.Vijayarajan, Associate Professor/HOD, Vellore Institute of Technology, Vellore 1. Mrs.V.Vijayalakshmi, SRMIST

294
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC317J INFORMATION RETRIEVAL TECHNIQUES C PROFESSIONAL CORE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basics and importance of Information Retrieval 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: analyze a problem based on fitting an appropriate modeling and retrieval evaluation to its solution

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: apply machine learning techniques for classification and clustering of Information

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: implementation of various search engine system operations

Environment &
Sustainability
CLR-5: apply knowledge of Retrieving information on Text models and various recommender systems

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: define the basic methods of Information Retrieval and their importance 3 - - - - - - - - - - - 2 - -
CO-2: interpret the Modeling methods and Evaluation of Information Retrieval 3 2 - - - - - - - - - - - - 3
CO-3: infer appropriate methods for indexing, classification, and clustering - 3 - 3 - - - - - - - - - 2 -
CO-4: clarify the various search engine system operations 2 - - - - - - - - - - - - - 3
CO-5: demonstrate recommender systems and language models - 2 3 - - - - - - - - - - 2 3

Unit-1 - Introduction 12 Hour


Information Retrieval: Definition, Objectives, Functional Overview, Relationship to DBMS– Early Developments – Areas and Applications of Information Retrieval- Issues with IR – The IR Search Architecture - Data
Retrieval and Visualization- Information versus Data Retrieval
Unit-2 - Modeling and Performance Evaluation 12 Hour
IR Models – Boolean Model - Term Weighting – Vector Space Model – Probabilistic Model – Language Models – Neural Network Model – Text Processing and Retrieval Models – Retrieval Metrics – Query Processing
and Refinement Techniques - Query Optimization - Precision -Recall - F-Measure
Unit-3 - Indexing and Data Mining Techniques 12 Hour
Indexing: Introduction - Dictionaries - Inverted Files - Encoding - Static and Dynamic Inverted Indices - Scalable Indexing - Index Compression - Classification: K- Nearest Neighbor - Naïve Bayes - Support Vector
Machines- Clustering: Partitioning method - K- Means Clustering - Hierarchical Clustering
Unit-4 - Search Engines 12 Hour
The Web – History of Web - Searching the Web - Structure of the Web - Search Engine Architectures –– Search Engine Ranking – Link-based Ranking – Simple Ranking Functions – Static and Dynamic Ranking -
Search Engine Optimization - Google Search Engine - Web Crawler
Unit-5 - Text Retrieval Model and Recommendations System 12Hour
Natural Language Processing in IR - Basic Document Retrieval - Stemming - n-gram models - Document Scoring - Document as a Vector - Token Recognition- Document Scoring -Document as a Vector - Advance
Topics: Recommendation Systems - Sentimental Analysis - Recommender Systems Functions

295
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Practice:
Practice 1: Case Study on Data Retrieval Techniques Practice 9: Implementation of the Clustering technique on a dataset
Practice 2: Case Study on Various Data Visualization tools Practice 10: Case Study on Implementation of Various search engines
Practice 3: Extraction of Raw Data Practice 11: Implementation of Page Ranking Algorithm on a search engine
Practice 4: Implementation of Term Weighting Practice 12: Implementation of Web Crawler
Practice 5: Implementation of Text Processing Model Practice 13: Implementation of Basic Document Retrieval
Practice 6: Implementation of Neural Network Model Practice 14: Case Study on various Recommendation Systems
Practice 7: Implementation of Scalable Indexing Practice 15: Implementation of Sentimental Analysis
Practice 8: Implementation of Classification Technique on a dataset

1. Ricardo Baeza-Yates and Berthier Ribeiro-Neto, ―Modern Information Retrieval: The 6. Ricardo Baeza, Yates - Modern Information Retrieval: The Concepts and Technology Behind
Concepts and Technology behind Search, Second Edition, ACM Press Books, 2011. Search, Addison-Wesley Professional; 2nd edition, 2011
2. Stefan Buettcher, Charles L. A. Clarke and Gordon V. Cormack, ―Information 7. Ricci, F, Rokach, L. Shapira, B.Kantor, ―Recommender Systems Handbook, First Edition,
Learning Retrieval: Implementing and Evaluating Search Engines, The MIT Press, 2016 2011.
Resources 3. Jaime Spooner - Modern Information Retrieval, Excelic Press, 2019. 8. Christopher D. Manning, Prabhakar Raghavan and Hinrich Schtze, Introduction to Information
4. Yates - Modern Information Retrieval, Pearson India, 1 st Edition, 2016. Retrieval, Cambridge University Press. 2008.
5. Kowalski Gerald Et Al - Information Retrieval Architecture and Algorithms, Springer 9. C. Manning, P. Raghavan, and H. Schütze, ―Introduction to Information Retrieval,
India, 1st Edition, 2013. Cambridge University Press, 2008.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 10% 25% -
Level 2 Understand 30% - - 25% 30% -
Level 3 Apply 30% - - 30% 25% -
Level 4 Analyze 25% - - 25% 20% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. K. Arul, Project Manager, ANCIT Consulting, Bangalore 1. Dr. D. Karthika Renuka, Professor, PSG College of Technology 1. Dr. V.M. Gayathri, SRMIST
2. Mr. Gopinath Balu, Saama Technologies 2. Dr. A. Balasundaram, Assistant Professor (Gr-III), VIT Chennai 2. Dr. P. Supraja, SRMIST

296
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Elective Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

297
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE267T STATISTICS FOR MACHINE LEARNING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: grasp the basics of statistics for machine learning 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the concepts of machine learning models and supervised learning

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: familiarize the unsupervised learning techniques

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: gain knowledge in tree-based machine learning models

Environment &
Sustainability
CLR-5: utilize the reinforcement learning and recommendation Engines

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the knowledge on Statistics Machine Learning Terminologies 3 - - - - - - - - - - 3 - -
CO-2: perceive the concepts about the Machine Learning Models and Supervised Learning Technique 3 2 - - - - - - - - - 3 - -
CO-3: implement the Unsupervised Learning Techniques 2 3 - 2 - - - - - - - - - 2 -
CO-4: apply the knowledge in tree-based machine learning models 3 3 - 2 - - - - - - - - - - 3
CO-5: analyze the concepts of Reinforcement Learning and Recommendation Engines 3 3 - 3 - - - - - - - - - - 3

Unit-1 - Introduction to Statistical Terminology 9 Hour


Statistical terminology for model building and validation- Major difference between statistical modeling and machine learning- Machine learning terminology - Steps in Machine learning development and deployment-
Statistical fundamentals and terminology for model building and validation.
Unit-2 - Machine Learning Models and Supervised Learning 9 Hour
Regression in machine learning models-Types of Regression-Linear Regression-Simple Linear Regression-Multiple Linear Regression-Ridge and Lasso Regression-Logistic Regression, Supervised Learning - K-
Nearest Neighbor- Naive Bayes-Support Vector Machine (SVM)
Unit-3 - Unsupervised Learning 9 Hour
K-means Clustering, Principal Component Analysis (PCA), Singular Value decomposition (SVD), Deep auto encoders, Deep auto encoders applied on handwritten digits using Keras
Unit-4 - Tree Based Machine Learning Models 9 Hour
Ecision Tree Classifier-Random Forest Classifier-Bagging Classifier-AdaBoost Classifier-Gradient Boost Classifier.
Unit-5 - Reinforcement Learning and Recommendations 9 Hour
Introduction to Reinforcement Learning-Characteristics of Reinforcement Learning-Reinforcement Learning Basics-Category1.Value Based- Category 2. Policy Based- Category 3. Actor centric- Category 4. Model
Free - Category 5-Model Based-Fundamental categories in sequential decision making -Content based filtering-Collaborative Filtering- Applications of reinforcement learning with integration of machine learning.

1. Pratap Dangeti, “Statistics for Machine Learning”,1st edition, Packt Publishing, 2017 4. Peter Bruce, Andrew Bruce, “Practical Statistics for Data Scientists”, 2 nd edition,
Learning 2. Richard Golden, “Statistical Machine Learning aUnified Framework”, 1st edition, CRC press, 2020 O’Reily, 2017
Resources 3. Himanshu Singh, “Statistics to Machine learning”,1st edition, BPB publications,2021 5. Gareth James, Daniela Witten, “An Introduction to Statistical Learning”, 2nd edition,
Springer, 2014
298
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Amish Anand @wipro.com 1. Dr. Ameer, National Institute of Technology, Calicut 1. Dr. J. Godwin Ponsam, SRMIST
2. Dr. Varaprasad Rao, Sree Dattha Institute of Engineering & Science 2. Dr. R. Radhika, SRMIST

299
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE310J QUANTUM COMPUTATION E PROFESSIONAL ELECTIVE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: gain knowledge about quantum computing and quantum mechanics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: analyse the Quantum Circuits

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: utilize Open source Qiskit for quantum programming

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn about Grover and Deutsch Jozsa quantum algorithms

Environment &
Sustainability
CLR-5: utilize the quantum concept and explore its applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify the need of quantum computing and quantum mechanics 1 3 - - - - - - - 2 - -
CO-2: explore the Quantum gates and Quantum Circuits 2 3 1 - - - - - - - 2 - -
CO-3: develop the quantum programs for circuit optimization 2 3 - 3 - - - - - - - - 2 - -
CO-4: incorporate the Quantum algorithms Deustch Jozsa and Grover 2 3 - 3 - - - - - - - - 2 - -
CO-5: demonstrate the different Quantum simulators and real time applications 1 3 - 3 - - - - - - - - 2 - -

Unit-1 – Introduction to Quantum Computation 12 Hour


Need for Quantum Computing and fundamental concepts- Vector spaces, Probability- Complex numbers and mathematical preliminaries- Postulates of quantum mechanics- Bra-ket notations- Measurements-
Composite systems- Bells theorem- Entanglement- Pure and Mixed states- Block sphere.
Unit-2 – Quantum Gates and Circuits 12 Hour
Fubini study metric- Geometry of quantum states- Tutorial style problem solving session- Complexity classes- Turing machine- Turing machine concepts- Quantum gates- Quantum circuits- Quantum circuits design
Unit-3 – Quantum Circuit Optimization 12 Hour
Quantitative measures of circuit- Analysis of quality of Circuits- Circuit optimization- Tutorial style problem solving sessions- Introduction to quantum algorithms- Deustch Jozsa algorithm- Oracles and Phase kick
back- Deustch Jozsa Algorithm-details
Unit-4 – Quantum Grover Algorithm 12 Hour
Introduction to Grover algorithm- Detailed walk through on Grovers algorithm- Quantum Amplitude Estimation- Tutorial-problems analysis- Problem solving session- Programming concepts in Qiskit- Analysis of
Qiskit- Exploring Qiskit- Programming in quantum- Analysis of exercises created by NPTEL- Usage of IBM composer.
Unit-5 – Quantum Applicatiions 12 Hour
Introduction to quantum applications- Research challenges of quantum- Introduction to QC Models- Physical Realization of Models- Tech landscape- VQE- Tutorial-problems- Problem solving session- Discussion
of different use cases- Use case in logistics- Use case in ML and image processing- Use case in finance and quantum cryptography.

300
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Lab Experiments
Lab 1: Python basics Lab 9: Project preparation phase 3 (Implementation of quantum problem statement in cloud environment)
Lab 2: Navigation on Circuit composer and Qiskit in Quantum Lab Lab 10: Quantum teleportation in Qiskit
Lab 3: Project preparation phase 1 (Analysis of problem statement related to quantum computing) Lab 11: Implementation of Grovers algorithm
Lab 4: Quantum hardware and Simulators Lab 12: Project preparation phase 4 (Testing of the software implemented)
Lab 5: implement single and multiple qubit gates Lab 13: project presentation and demo (use case developed)
Lab 6: Project preparation phase 2 (Design of the project based on problem statement) Lab 14: Project thesis preparation
Lab 7: Quantum circuits Lab 15: Project report submission (Thesis of use case developed)
Lab 8: Visualization tools (State vector and Q-Sphere)

1. Quantum Computation and Quantum Information. M. A. Nielsen and I. L. Chuang, 7. An Introduction to Quantum Computing. P. Kaye, R. Laflamme, and M. Mosca, Oxford University
Cambridge University Press Press, New York
2. Presskil Lecture notes: Available online: 8. Quantum Computer Science. N. David Mermin: Cambridge University Press
http://www.theory.caltech.edu/~preskill/ph229/ 9. Quantum Cryptography. D. Unruh: Available online:
Learning
3. MichaelA. Nielsen and Issac L. Chuang," Quantum Computation and Information, https://courses.cs.ut.ee/all/MTAT.07.024/2017_fall/uploads/
Resources
Cambridge, 2002 10. NIST Post Quantum Cryptography, Available online: https://csrc.nist.gov/projects/post-quantum-
4. Mikio Nakahara and Tetsuo Ohmi,"Quantum Computing", CRC Press, 2008 cryptography/round-2-submissions
5. N. David Mermin,"Quantum Computer Science", Cambridge, 2007 11. Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience.
6. https://qiskit.org/ SAPV Tharrmashastha, D. Bera, A. Maitra and S. Maitra, Springer 2020.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - - 15% -
Level 2 Understand 20% - - - 20% -
Level 3 Apply 45% - - 40% 45% -
Level 4 Analyze 20% - - 30% 20% -
Level 5 Evaluate - - - 30% - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mrs.Prabha Narayan, QKRISHI 1. Dr. Gayathri.M, SRMIST

301
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE373T STREAMING ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic building blocks of stream processing 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: relate streaming data in real time

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: explore the data ingestion options into stream processing engines

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: extend stream processing results to end users

Environment &
Sustainability
CLR-5: explore NOSQL storage options to store real time data

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: illustrate the concepts and terminologies in stream processing 2 3 - 2 2 - - - - - - - 2 - -
CO-2: interpret stream processing applications using Apache Spark Streaming 2 2 - 2 2 - - - - - - - - 3 -
CO-3: summarize real-time streaming data pipelines and applications that adapt to the data streams using Kafka 2 2 - 2 2 - - - - - - - - 3 -
CO-4: interpret stream processing applications using Apache Storm Streaming 2 2 - 2 2 - - - - - - - - 3 -
CO-5: inquire real time data using NoSQL databases & MongoDB 2 2 - 2 2 - - - - - - - - - 3

Unit-1 - Fundamentals of Stream Processing 9 Hour


Introducing Stream Processing, Stream Processing, Examples of Stream Processing, Scaling Up Data Processing, Distributed Stream Processing, Stream-Processing Model, Sources and Sinks, Immutable Streams
Defined from One Another, Transformations and Aggregations, Window Aggregations, Stateless and Stateful Processing, Stateful Streams, An Example: Local Stateful Computation in Scala, Stateless or Stateful
Streaming, Streaming Architectures, Components of a Data Platform, Architectural Models, The Use of a Batch-Processing Component in a Streaming Application, Referential Streaming Architectures, Streaming
Versus Batch Algorithms
Unit-2 - Apache Spark and Structured Streaming 9 Hour
Apache Spark as a Stream-Processing Engine, Spark’s Distributed Processing Model, Spark’s Resilience Model, Introducing Structured Streaming, The Structured Streaming Programming Model
Unit-3 - Kafka-A Realtime Data and Stream Processing 9 Hour
Getting Started with Kafka, Kafka, Publish Subscribe messaging model, Kafka Architecture, Messages and Batches, Schemas, Topics and Partitions, Producers and consumers, Brokers and Clusters, Multiple
Clusters, Data Ecosystem, Kafka Producers: Writing messages to Kafka, Kafka Consumers - Reading data from Kafka, Stream Processing- Stream Processing Design Patterns-Kafka Streams by Examples- Kafka
Streams: Architecture Overview
Unit-4 - Apache Storm 9 Hour
che Storm – Introduction, Real-Time Processing and Storm Introduction, Storm Deployment, Topology Development, and Topology Options, Storm Parallelism and Data Partitioning, Integration of Storm, and Kafka
Unit-5 – No SQL Databases in Cloud and MongoDB 9 Hour
NoSQL Data Bases, AWS Cloud Dynamo Database: Amazon DynamoDB features, Serverless, Introduction to MongoDB, MongoDB Data Model, MongoDB Architecture - Core Processes, MongoDB Tools,
Standalone Deployment, Replication, Sharding, MongoDB Use Cases- Performance Monitoring, and Social Networking.

302
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Garillot F and Mass. G., Stream Processing with Apache Spark, 1st ed., O'Reilly Media, 4. https://docs.mongodb.com/manual/changeStreams/
Inc., 2019. 5. Shakuntala Gupta Edward Navin Sabharwal, "Practical MongoDB Architecting, Developing, and
Learning
2. Narkhede N, Shapira. G, and Palino T., Kafka: The Definitive Guide - Real-Time Data Administering MongoDB"Apress,2016
Resources
and Stream Processing at Scale, 1st ed., O'Reilly Media, Inc.,2017 6. https://aws.amazon.com/dynamodb/features/?pg=dynamodbt&sec=hs
3. Ankit Jain, Mastering Apache Storm, 1st ed., Packt Publishing,2017

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Gangeyan Ranganathan, Project Delivery Specialist Ii , 1. Dr Surendiran B, Associate Professor, National Institute of 1. Dr. B Yamini, SRMIST
Deloitte Consulting Llp, Sacramento, California Technology, Puducherry
2. Mr. Shri Raghu Raaman, Solidity Developer, Pixelvault Inc., 2. Dr. Selvakumar K., B.E., M.E., Ph. D, Assistant Professor Grade-II, 2. Dr. G Suseela, SRMIST
Toronto, Canada Department of Computer Applications, National Institute of Technology
Trichy, Tiruchirappalli-620015, Tamil Nadu, India

303
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE475T APPLIED GRAPH THEORY E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basics of graph theory 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: gain Knowledge on trees and circuits

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: outline planar and dual graphs

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: illustrate about matching and coloring problems

Environment &
Sustainability
CLR-5: learn the applications of graph theory

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: comprehend the knowledge of graph basics 2 2 - - - - - - - - - - 2 - -
CO-2: acquire the ability to solve the trees and circuit problems - - 3 3 - - - - - - - - - 3 -
CO-3: design the Dual Graphs and detect the planarity - 3 3 - - - - - - - - - - 3 -
CO-4: apply the knowledge of matching and coloring to solve complex problems 2 3 3 - - - - - - - - - 2 - -
CO-5: make use of the graph theory in real time applications 2 - - 3 - - - - - - - - - 3 -

Unit-1 - Introduction to Graphs 9 Hour


Graphs-Definition of graphs and digraphs- Types of graphs- Directed graphs - Graph Isomorphism - Incidence and Adjacency Matrices- Subgraphs- Vertex degrees and counting -Large bipartite subgraphs - The
handshake lemma - Havel-Hakimi Theorem- - Independent Sets and Cliques -Path, Walk, Connections and Circuits- Cycles-Euler graphs- Hamiltonian Path and Circuit- Travelling Salesman Problem
Unit-2 - Trees and Circuits 9 Hour
Introduction to trees - Properties of trees - Pendant Vertices, Distance and Centre vertices- Rooted and Binary Trees- On counting trees- Spanning Trees: Finding spanning trees of a graph- Prim’s Spanning Tree
Algorithm, Kruskal’s Spanning Tree Algorithm - Cut Sets: Properties of cut sets- Connectivity and Separability – Network Flows: 1-Isomorphism, 2-Isomorphism
Unit-3 - Planar and Dual Graphs 9 Hour
Combinatorial and Geometric Graphs- Planar Graphs- Representations of a planar graphs -Kuratowiski’s Two Graphs - Detection of Planarity- Geometric Dual- Combinatorial Dual – Thickness and Crossings,
Euler’s Formula, Five – Color Theorem and the five color Conjecture, Non-Hamiltonian Planar Graphs, Planarity Algorithm
Unit-4 - Matchings and Colorings 9 Hour
Matchings and Coverings in Bipartite Graphs - Chromatic number - Lower bounds from clique number and maximum independent set - Upper bounds from greedy coloring - Szekeres-Wilf and Brooks' Theorem -
k-critical graphs - Cartesian product of graphs - Interval graphs - k-Chromatic graphs - Mycielski's construction - Turán's Theorem - Edge coloring - Line graphs - Vizing’s Theorem
Unit-5 - Applications of Graph Theory 9 Hour
Transport Networks – Extensions of Max-Flow and Min-Cut Problems - Minimal Cost Flows – The Multicommodity Flow- Further Applications – More on Flow Problems – Activity Networks in Project Planning –
Analysis of an Activity Network – Graphs in Computer Programming - Graphs in Game Theory

304
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Narsingh Deo - Graph Theory with Applications to Engineering, Dover Publications McGraw 3. R. Gould – Graph Theory, Dover Publications, Reprint, 2012
Learning Hill Education –2016 4. Reinhard Diestel - Graph Theory, Springer Publisher, Fifth edition, 2017
Resources 2. J.A. Bondy and U.S.R. Murthy – Graph Theory with Applications, Elsevier Science 5. Robin J. Wilson - Introduction to Graph Theory, Pearson Education, Fourth Edition, 2004
Publishing, Fifth Edition, 2008

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Krishna Kumar, Technical Lead, Wipro 1. Dr.K.M. Dhanya, Associate Professor, Government Engineering 1. Dr.V.R. Balasaraswathi, SRMIST
College, Palakkad
2. Mr. Lakshmikanthan Pudunagar Subbiah, Wintel CC team 2. Dr.T. Suguna, Assistant Professor, Government College of 2. Dr. Meenakshi K, SRMIST
Technology, Coimbatore

305
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE476T LOGICAL DEDUCTION AND NON-VERBAL REASONING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: explore the basic concepts of logics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: identify the insights of logics in terms of Computer based Applications

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: evaluate and understand predicate logic

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: relate abstract and logical thinking skills to Computational Approach

Environment &
Sustainability
CLR-5: identify and analyze case studies that uses the ideology of non-verbal reasoning

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: appraise the importance and role of logics in computer science 3 3 - - - - - - - - - 2 - 2 -
CO-2: analyze the syntax and semantics of propositional logic and its applications 3 2 - - - - - - - - - - - 2 -
CO-3: apply the concept of predicate logic to computational Science 3 2 - - - - - - - - - - - 2 -
CO-4: ability to understand the logical and abstract thinking concepts of Non-Verbal Reasoning - 2 - 3 - - - - - - - - - 2 -
CO-5: utilize the Non-Verbal Reasoning knowledge gained to Computational Applications - 2 - 3 - - - - - - - - - 2 -

Unit-1 - Logics in Computer Science 9 Hour


Introduction: What is Logic – History of logic – Overview of logic in computer science, Sets, Relations and Functions, operations on Binary Relations, Ordering Relations, Partial order and Trees, Infinite Sets, Set
theory -Basics for formulating Data Structures, Databases
Unit-2 - Propositional Logic and Applications 9 Hour
Introduction to Propositional Logic: Syntax, well-formed Formulas, Semantics, Interpretations, truth tables, satisfaction – Satisfiability, entailment, validity – CNF / DNF, Binary Decision Diagrams- Model Counting,
Mathematical Induction, Deduction, Applications - Query Search Engines, Query Search Databases
Unit-3 - Predicate Logic 9 Hour
Introduction to Predicate Logic-Syntax and Semantics, well-formed Formulas, Quantifiers, Decision Problems, Equivalences, Translation of Predicates to Natural Language, Applications-Natural Language,
Databases
Unit-4 - Non-Verbal Reasoning: Introduction to Logical and Abstract Concepts 9 Hour
Image Series, Shapes-Animation and computer graphics, Rule Deduction- Rule based Algorithms, Pattern, and Incomplete Patterns - Pattern Recognition Algorithms and Applications
Unit-5 - Non-Verbal Reasoning: Case Studies 9 Hour
Grouping of Identical Figures- Clustering Algorithms and Application, Cube, and dice - Naive Approach Vs Computational Approach, Figure Formation and Analysis-Knowledge Representation and reasoning

306
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Michael Huth and Mark Ryan, Logic in Computer Science Modelling and Reasoning 4. Uwe Schoning, Logic for Computer Scientists,
about Systems, 2nd Edition, 2004. http://tinman.cs.gsu.edu/~raj/8710/f16/UweSchoning/UweSchoningBook.pdf, 1989
2. Steve Reeves and Mike Clarke, Logic for Computer Science, Department of Computer 5. Acob Eisenstein, Natural Language Processing,
Learning Science Queen Mary, and Westfield College University of London U.K. Department of https://cseweb.ucsd.edu/~nnakashole/teaching/eisenstein-nov18.pdf,2018.
Resources ComputerScienceUniversityofWaikatoNewZealand 6. RS Aggarwal, A Modern Approach to Verbal and Non-Verbal Reasoning, 16th Edition, 2018.
https://www.cs.waikato.ac.nz/~stever/LCS.pdf, 2003 Edition. 7. John Vince, Essential Computer Animation Fast How to Understand the Techniques and Potential
3. MauricioAyala-Rincon, Applied Logic for Computer Scientists, of Computer Animation 2000 Edition, Springer.
https://users.aalto.fi/~rintanj1/notes-logic.pdf,2017.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. John Paul,Senior IT Analyst,Bank of America 1. Dr.Devan,Associate Professor,Department of CSE,Easwari Autonomous College 1. Dr. A. Helen Victoria, SRMIST
2. Mr. Lakshmi Narayanan,Telecom Engineer 2. Dr.L.C.Manikandan,Professor ,Department of CSE,Valia oonambaikulathamma 2. Dr. M. Anand, SRMIST
College of Engineering and Technology,Parippally,Thirunvanthapuram ,Kerala

307
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE477T CLOUD NATIVE ARCHITECTURE FOR MODERN PLATFORMS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand architectural principles behind a modern application platform 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
understand the best high-level structures for different kinds of applications, including web, database,
CLR-2:
thick-client, and web applications

Environment & Sustainability


The engineer and society
CLR-3:

Conduct investigations of
understand the core principles of software design

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


understand how Spring and ReactJS frameworks eliminate tedious configuration and repetitive coding

Modern Tool Usage

Life Long Learning


complex problems
CLR-4: tasks, making it easy to build enterprise-ready, production-quality software.Components of modern

Problem Analysis

Communication
platforms
CLR-5: understand micro services, reactive development, and other modern application designs

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
demonstrate events, perform state updates, and manage conditional content; Apply styles dynamically
CO-1: 2 3 - - - - - - - - - - - - 3
and conditionally to create a modern UI
implement components and stereotypes to satisfy given business requirements that could include both
CO-2: - - 3 2 - - - - - - - - - 3 -
synchronous and asynchronous web applications
design and implement a scalable polyglot persistence layer including regular star schema and document
CO-3: - - 3 - 2 - - - - - - - - 2 -
store
design independent, composable, loosely coupled services that integrate well with device independent
CO-4: - - 3 - 2 - - - - - - - - 2 -
frontend UI components of modern platforms
build non-functional characteristics such as scalability, performance engineering and security aspects
CO-5: - - 3 3 - - - - - - - - 2 -
into the solution

Unit-1 - Modern Application Platforms 9 Hour


Introduction to modern application platforms, Introduction concept: distributed systems, Agility: user stories and acceptance test cases, Modelling: Requirements, Technology: Web, Web Stock and REST,
Technology: Synchronous Controllers and asynchronous Web flux mapping- Workshop using user stories, spring boot framework, synchronous controllers, and Asynchronous Web Flux sockets. Ploygot Persistence,
Introduction Concept: Distributed Database, Technology: NoSQL and NewSQL Data modellig. Agility: Product Backlog, Modelling: Data, Technology: Mapping to Repositories, Workshop using Document Database
and RDBMS. CA Project Instructions briefing, Service Fundamentals Introduction Concept: Cloud Computing Introduction, Agility: Pair Programming, Modelling: user Interface Technology Service design and API
end points, Technology: Mapping Entities to Repositories, Workshop using service components, data access components and API endpoints.
Unit-2 - Full Stack Components 9 Hour
Full Stack Components: Introduction Concept: Distributed Service communication, Agility: Test Driven Development, Modelling: Technical Backlog, Technology: Reactive Client-side Technologies, Technology: Build
tools and Test automation, Technology: End to End Application Layering, Workshop using Synchronous components and client side. CA Project Mile stone MVP Submission, Cloud Native Reference Architecture,
Introduction Concept: Cloud managed services (distributed), Modeling: Architectural Prototype, Technology: Reference Architecture, Technology: Cloud Native Design, Technology: Container Kuberetes part 1.

308
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-3 - Micro Services 9 Hour
Micro services Architecture: Introduction Concept: Domain Drive Design, Modelling: Bounded Context, Workshop using end to end layering of components and cloud hosting, and Technology: Element of micro
services and implementation mechanism, Technology: Container - Kubernetes part 2, Technology: Inter-micro services communication, Workshop for moving from monolithic to microservices components. CA
Project milestone Archetype Submission, Serverless Architecture, Introduction Concept: Function as a service, Modelling: Functions, Technology: Elements of functions and workflow implementation mechanism
Unit-4 - Functions and Containers 9 Hour
Technology: Functions Vs Containers (Kubernetes vs Kubeless), Technology: Inter-functional communication, Workshop using serverless functions, Event Driven Architecture, Introduction Concept : Work Queue
Systems, Technology : Producer, Consumer and Messages, Technology: Event Brokers versus message Brokers, Technology: Event-Driven Processing, Workshop using Event driven messages (both producers
and consumer) and processing the same Design for Scalability, Introduction Concept: Application scaling, Concept: Data Scaling, Caching and Replication, Concept: Distributed systems communication Technology:
Container orchestrated scaling and replication.
Unit-5 - Container Hosting 9 Hour
Workshop for container hosting, CA project milestone First Iteration Submission, Metrics, Monitoring and Performance Engineering, Introduction Concept: Quality metrics for non-functional Requirements, Concept:
Distributed tracing for profiling an monitoring concept: Performance Engineering, Technology: Contain orchestrated scaling and replication, Workshop for performance engineering, Security Architecture for Modern
Platforms, Introduction Concept: Distributed Service Security, Modelling: Threat models and SWOT Analysis, Technology: Identity and access management, Technology: Data asset classification and Protection,
Technology: Container security, Workshop for Security Implementation Platform Reliability Engineering, Introduction concept: Distributed service reliability, Technology: Service Level Indicators, Workshop for
reliability Implementation.

1. Clean Architecture: A Craftsman's Guide to Software Structure and Design by Robert C. Martin; 4. White, Joshua, and Willie Wheeler. Spring in practice. Simon and Schuster, 2013.
Learning published by: Pearson; publication date: September 2017. 5. Boduch, Adam, and Roy Derks. React and React Native: A complete hands-on guide
Resources 2. Johnson, Rod, et al. "The spring framework–reference documentation." interface 21 (2004): 27. to modern web and mobile development with React. js. Packt Publishing Ltd, 2020.
3. Walls, Craig. Spring in action. Simon and Schuster, 2022.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Srinivasan Varadharajan, Senior Principal Software 1. Dr. Surya Priya Asaithambi, Principal Lecturer and Consultant, 1. Dr M. Thenmozhi, SRMIST
Engineer, Manhattan Associates, Atlanta, United States. Software Systems Practice, National University of Singapore.
2. Mr. Shiva Praveen, American Express, USA. 2. Dr. B. Vinayaga Sundaram, Associate Professor, 2. Dr. S. Metilda Florence, SRMIST
Madras Institute of Technology, Chennai.

309
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE479T FAULT TOLERANT SYSTEMS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: familiarize the measures of Fault tolerance and Dependable Systems 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the various techniques used for hardware fault tolerance

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: determine the various forms of redundancy for enhancing system reliability

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the various techniques for software fault tolerance

Environment &
Sustainability
CLR-5: exploring fault tolerance in real time systems

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify the faults which may cause the system to fail 2 - - - - - - - - - - - 3 - -
apply various techniques for overcoming hardware failure and identify the best suited technique for the
CO-2: 2 - - 3 - - - - - - - - 3 - -
identified fault
CO-3: choose various redundancy forms to enhance reliability of the system identified with fault 2 - - 3 - - - - - - - - 3 - -
CO-4: analyze the methodology best suited for identified software fault 2 - - 3 - - - - - - - - 3 - -
CO-5: illustrate the fault tolerance in real time systems 2 3 - - - - - - - - - - - - 3

Unit-1 - Introduction to Fault-Tolerance 9 Hour


Error, Faults and Failures; Fault Classification, Basic Measures of Fault Tolerance: Traditional and Network; Reliability and Availability; Dependable system, techniques for achieving dependability, dependability
measure
Unit-2 - Hardware Fault Tolerance 9 Hour
Failure Rate, Reliability, and Mean Time to Failure, Canonical and Resilient Structures, Reliability Evaluation Techniques, Fault-Tolerance Processor-Level Techniques, Byzantine Failures.
Unit-3 - Information Redundancy 9 Hour
Coding, Resilient Disk Systems, Data Replication, Algorithm-Based Fault Tolerance
Unit-4 - Software Fault Tolerance 9 Hour
Acceptance Tests, Single-Version Fault Tolerance, N-Version Programming, Recovery Block Approach, Preconditions, Postconditions, and Assertions, Exception-Handling, Software Reliability Models, Fault-
Tolerance Remote Procedure Calls
Unit-5 - Checkpointing 9 Hour
Checkpoint Level, Optimal Checkpointing, Checkpointing in Distributed and Shared-Memory Systems, Checkpointing in Real-Time Systems, Case studies: IBM G5, IBM Sysplex, Itanium

310
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Israel Koren and C. Mani Krishna; Fault-Tolerant Systems; Morgan-Kaufman 4. Martin L. Shooman; Reliability of Computer Systems and Networks: Fault Tolerance, Analysis, and
Publishers, 2007 Design; John Wiley & Sons Inc., 2002
Learning
2. Dubrova, Elena. Fault-tolerant design. New York: Springer, 2013 5. P. Jalote, “Fault Tolerance in Distributed Systems”, Prentice-Hall Inc. 1994
Resources
3. Michael R. Lyu; Handbook of Software Reliability Engineering; IEEE Computer Society 6. D. K. Pradhan, “Fault-Tolerant Computing, Theory and Techniques”, Prentice-Hall, 1998
Press (and McGraw-Hill), 1996

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Joseph Aloysius, Consultant, TCS. 1. Dr. Latha, Prof & head, dept of CSE, St. Peters Engg college, chennai 1. Dr.V. Elizabeth Jesi, , SRMIST
2. Ms. G. Saranya, , SRMIST

311
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE480T IMAGE AND VIDEO PROCESSING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basics of Digital Image Processing concepts 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: apply simple image enhancement techniques in spatial and frequency domain

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: analyze the concepts of Image compression and segmentation techniques

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: gain some basic knowledge on Digital video processing

Environment &
Sustainability
CLR-5: utilize the video processing and streaming techniques for real-time programming applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: describe the basics of Digital Image Processing concepts 3 2 - - - - - - - - - - 3 - -
identify appropriate image enhancement, smoothing and sharpening filters techniques for real time
CO-2: - 2 - 3 - - - - - - - - 3 - -
applications
CO-3: implement image compression techniques for real time applications - 2 - 3 - - - - - - - - 3 -
CO-4: acquire the fundamental concepts and terminologies in video processing 3 2 - - - - - - - - - - 3 - -
CO-5: demonstrate Video streaming Techniques for real time applications - - 2 3 - - - - - - - - - 3

Unit-1 - Fundamentals of Image Processing and Image Transforms 9 Hour


Basic steps of Image Processing System Sampling and Quantization of an image, Basic relationship between pixels. Image Segmentation: Segmentation concepts, Point, Line and Edge Detection, Thresholding,
Region based segmentation
Unit-2 - Image Enhancement 9 Hour
Spatial domain methods: Histogram processing, Fundamentals of Spatial filtering, smoothing spatial filters, Sharpening spatial filters. Frequency domain methods: Basics of filtering in frequency domain, Image
smoothing, Image sharpening, Selective filtering.
Unit-3 - Image Compression and Segmentation 9 Hour
Image compression fundamentals –Basic compression methods- Lossy & Lossless, Transform and Truncation coding, Huffman coding, Predictive coding, JPEG Standards. Image segmentation techniques.
Unit-4 - Fundamentals of Video Processing 9 Hour
Analog Video, Digital Video. Time-Varying Image Formation models: Three-Dimensional Motion Models, Geometric Image Formation, Photometric Image Formation, Sampling of Video signals, Filtering operations
Unit-5 - Streaming Video Over the Internet 9 Hour
Architecture for Video Streaming Systems, Video Compression, Application Layer Qos Control For Streaming Video, Continuous Media Distribution Services, Streaming Servers, Media Synchronization, Protocols
For Streaming Video.

312
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Gonzaleze and Woods, “Digital Image Processing using MATLAB'', 2nd Edition, 4. A Murat Tekalp, “Digital Video Processing”, PERSON, 2010
McGraw Hill Education, 2016 5. Bovik, “Handbook of Image & Video Processing”, Academic Press, 2010
Learning
2. Rafael C. Gonzales, Richard E. Woods, “Digital Image Processing”, Third Edition, 6. Yao Wang, Jorn Ostermann and Ya Qin Zhang, “Video Processing and Communications”, Prentice
Resources
Pearson Education, 2014. Hall Publishers, 2002.
3. S. Sridhar, “Digital Image Processing”, Oxford University Press, 2020.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Albert Rex, HP, Chennai 1. Dr. Ameer, National Institute of Technology, Calicut 1. Dr. K. Nimala, SRMIST
2. Mr. Amish Anand, Wipro Technologies 2. Dr. Varaprasad Rao, Sree Dattha Institute of Engineering & Science 2. Dr. G. Geetha, SRMIST

313
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

UNDERGRADUATE/ INTEGRATED POST


GRADUATE DEGREE PROGRAMMES
(With exit option of Diploma)

(Choice Based Flexible Credit System)

Regulations 2021

Volume – 11H
(Syllabi for Computer Science and Engineering w/s in
Internet of Things Programme Courses)

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

314
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Core Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

315
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC313J CLOUD COMPUTING FOR IoT C PROFESSIONAL CORE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: restate the Applications, Platform and Cloud services 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: label the different levels of cloud platforms and various laws

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: state Cloud applications and new opportunities

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: recognize the security levels and privacy of several layers of IoT

Environment &
Sustainability
CLR-5: evaluate the Authentication and Security of IoT

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: memorize the essentials of Applications, Platform and Cloud service - 2 - - 3 - - - - - - - - 3 3
CO-2: categorize different levels of cloud platforms and IoT systems - 2 - - 3 - - - - - - - - 3 3
CO-3: demonstrate new opportunities and cloud applications - 2 - - 3 - - - - - - - - 3 3
CO-4: analyze the different security levels and privacy of several layers of IoT - 2 - - 3 - - - - - - - - 3 3
CO-5: assess their knowledge of the Authentication and Security of IoT - 3 - - 3 - - - - - - - - 3 3

Unit-1 - Introduction to Cloud Computing 12 Hour


Introduction to Cloud Computing, Characteristics of Cloud Computing, Software Virtualization, Containerizing applications, Virtual Machine Provisioning & Manageability, Cloud Deployment models, Introduction to
IoT Platform, Cloud IoT Architecture, IoT Cloud Services, and Identity & Device Management.
Unit-2 - Cloud Modules and its Services 12 Hour
Introduction to Core IoT Modules, IoT cloud platforms like Open Shift & Kaa, Monitoring cloud services, Benefits & limitations, Deploy application over cloud, IoT Modules-A connected ecosystem, IoT Vs Machine-
to-Machine (M2M) Vs SCADA, Metcalfe's law and Beckstrom's laws.
Unit-3 - Cloud Policies and Mechanism 12 Hour
Policies and Mechanisms for Resource Management, Stability of a Two-Level Resource Allocation Architecture, A Utility-Based Model for Cloud-Based Web Services, Resource Bundling: Combinatorial Auctions
for Cloud Resources, Scheduling Algorithms for Computing Clouds, Resource Management and Dynamic Application Scaling, Architectural Styles for Cloud Applications, Existing Cloud Applications and Opportunities
for New Applications.
Unit-4 - Security and Privacy of IoT 12 Hour
Security and Impact of the Internet of Things (IoT) on Mobile Networks, Networking Function Security, IoT Networking Protocols, Secure IoT Lower Layers, Secure IoT Hig Layers, Secure Communication Links in
IoTs, Back-end Security, Secure IoT Databases, Security Products-Existing Test bed on Security and Privacy of IoTs
Unit-5 - Protocols of IoT 12 Hour
Authentication in IoT, Computational Security for the IoT, Privacy-Preserving Time Series Data Aggregation, Secure Path Generation Scheme for Real-Time Green Internet of Things, Security Protocols for IoT
Access Networks, Framework for Privacy and Trust in IoT, Policy-Based Approach for Informed Consent in Internet of Things, Network Robustness of Internet of Things and IoT security lifecycle.

316
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Lab Experiments
1. Configure a VM instance in your local machine in cloud by creating a cloud account 9. Experiment Cloud load balancing algorithms using Cloud analyst tool
2. Allocate CPU, Memory size and storage space as per a specified requirement of Cloud 10. Evaluate IoT based home automation system
3. Configure a Nested Virtual Machine (VM under another VM) in cloud and local machine 11. Exploit IoT based water level control system
4. Implementation of cloud scheduling algorithms using CloudSim 12. Design a Factory automation using IoT
5. Analyze cloud scheduling algorithms using OPNET 13. Assess Secure data communications between two IoT devices
6. Performance of Cloud scheduling algorithms using Cloud analyst tool 14. Examine IoT based assistive device for aged persons
7. Measure Cloud load balancing algorithms using Cloud Sim Create an IoT based power automation system
8. Investigate Cloud load balancing algorithms using OPNET

1. Rajkumar Buyya, “Cloud Computing Principles and Paradigms”, Wiley & Sons publisher, 4. Whitehouse O, “Security of things: An implementers’ guide to cyber-security for internet of things
2010. devices and beyond”, 1st edition, NCC Group, 2014.
Learning
2. David E.Y Sarna, “Implementing and Developing Cloud Computing Applications”, CRC 5. DaCosta, Francis, and Byron Henderson, “Rethinking the Internet of Things: a scalable approach
Resources
Press, 2018. to connecting everything”, 1st edition, Springer Nature, 2013.
3. Marco Schwartz, “Internet of Things with the Arduino Yun”, Packt Publishing, 2014.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 20% 30% -
Level 4 Analyze 30% - - 35% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. G. Pradeep, Intel @ FICE, Bangalore 1. Dr. Sudeepta Mishra, Indian Institute of Technology, Ropar, Punjab. 1. Dr. A. Suresh, SRMIST
2. Mr. Rajachozhan, Zoho Corp, Chennai 2. Dr. Subramanian Ganesan, Professor, Oakland University, USA. 2. Dr. V. Anbarasu. SRMIST

317
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC315J FOG COMPUTING C PROFESSIONAL CORE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: relate the basic concepts and the need of fog computing 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: articulate the research challenges and opportunities in the Fog computing

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: predict the basic knowledge in Integrating Fog, IoT & cloud

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: grasp the infrastructure, middleware architectures and data management for Fog computing

Environment &
Sustainability
CLR-5: classify the knowledge of Fog in various applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: contrast fog computing and edge computing - - 3 2 2 - - - - - - - - 2 3
CO-2: classify and address the research challenges in Fog Edge computing platform - - 3 3 2 - - - - - - - - 2 3
CO-3: summarize the knowledge in integrating IoT, Cloud and Fog - - 3 - 2 - - - - - - - - 2 3
CO-4: execute various data management techniques and design of middleware for Fog computing - - 3 - 2 - - - - - - - - 2 3
CO-5: experiment the knowledge of Fog in the design of various application - - 3 2 2 - - - - - - - - 2 3

Unit-1 - Introduction 12 Hour


Fog Computing Basics, Fog and Edge Computing Completing the Cloud, Hierarchy of Fog and Edge Computing, Business models, Opportunities and Challenges, Fog Computing Communication Technologies.
Unit-2 - Addressing the Challenges in FEC 12 Hour
The Networking Challenges, The Management Challenges, Miscellaneous Challenges.
Unit-3 - Foundation 12 Hour
Management and Orchestration of Network Slices in 5G, Fog, Edge, and Clouds: Background, Network Slicing in 5G, Network Slicing in Software-Defined Clouds, Network Slicing Management in Edge and Fog,
Future Research Directions.
Unit-4 - Middleware and Data Management 12 Hour
Introduction, Need for Fog and Edge Computing Middleware, Design Goals, State-of-the-Art Middleware Infrastructures, System Model, Proposed Architecture, Case Study Example. Data Management in Fog
Computing, Future Research and Directions.
Unit-5 - Application and Issues 12 Hour
Fog Computing Realization for Big Data Analytics, Data Analytics in the Fog, Prototypes and Evaluation. Case Study 1: Fog Computing in E-Health Monitoring. Case Study 2: Intelligent Traffic Lights Management
(ITLM) System.

318
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Lab Experiments
Lab 1: iFog Simulator installation and configuration setup. Lab 9: Connection of lower-level fog device with Gateway.
Lab 2: Implementation of Fog Nodes with different configuration set up. Lab 10: Simulation of clustering in fog nodes
Lab 3: Demonstration on various fog simulators. Lab 11: A Case Study – Scheduling in Fog Computing
Lab 4: Implementation of application models using iFog. Lab 12: A Case Study - Computational Offloading in Fog Computing
Lab 5: Simulation of application models using iFog Master Worker application models. Lab 13: A Case Study - Security and Privacy in Fog Computing
Lab 6: Simulation of application models using iFog Master Sequential Unidirectional application model. Lab 14: A Case Study - Cloud-fog Collaborations
Lab 7: Design of sensor nodes and simulate with different tuple emission rates. Lab 15: A Case Study – Green Fog Computing
Lab 8: Design of mobile edge node using iFog.

1. Rajkumar Buyya and Satish Narayana Srirama, “Fog and Edge Computing Principles 3. Amir Vahid Dastjerdi and Rajkumar Buyya, “Fog Computing: Helping the Internet of Things Realize
Learning and Paradigms”, Wiley Series on Parallel and Distributed Computing, 2019. its Potentialǁ”, University of Melbourne, 2016.
Resources 2. Assad Abbas, Samee U. Khan, and Albert Y. Zomaya, “Fog Computing: Theory and 4. Sudip Misra, Subhadeep Sarkar and Subarna Chatterjee, “Sensors, Cloud, and Fog: The Enabling
Practice”, Wiley Series on Parallel and Distributed Computing, 2020. Technologies for the Internet of Things”, CRC Press, 2019.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 20% 30% -
Level 4 Analyze 30% - - 35% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Vignesh, TCS, Bangalore 1. Dr. Arulprakash, Professor, IIT Madras 1. Dr. V Anbarasu, SRMIST
2. Mr. Rajachozhan, Zoho Corp, Chennai 2. Dr. Raju Abraham, NIOT, Chennai 2. Dr. A. Suresh. SRMIST

319
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Elective Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

320
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course INTRODUCTION TO IOT: SENSORS, ACTUATORS AND Course L T P C
21CSE264T E PROFESSIONAL ELECTIVE
Code Name MICROCONTROLLERS Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: recognize the basic concepts of IoT and applications 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
recollect the fundamentals of sensors and actuators, their characteristics, and various classification of

The engineer and society


CLR-2:

Conduct investigations of

Individual & Team Work


Engineering Knowledge
sensors and actuators

Design/development of

Project Mgt. & Finance


CLR-3: identify about various classification of sensors and actuators

Modern Tool Usage

Life Long Learning


complex problems
Problem Analysis

Communication
CLR-4: articulate the basics of Interfacing devices and microcontrollers

Environment &
Sustainability
CLR-5: utilize on IoT based applications

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: recollect the fundamental concepts in IoT - - 3 2 - - - - - - - - 2 2 -
CO-2: determine the performance characteristics of sensors and actuators - - 3 2 - - - - - - - - 2 2 -
CO-3: classify the different sensors and actuators used in IoT - - 3 2 - - - - - - - - 2 2 -
CO-4: categorize the Interfacing methods, circuits and controllers used in IoT applications - - 3 2 - - - - - - - - 2 2 -
CO-5: solve IoT based Applications - - 3 2 - - - - - - - - 2 2 -

Unit-1 - Introduction to IoT 9 Hour


Introduction – Physical Design of IoT - Logical Design of IoT – IoT Enabling Technologies – IoT Levels & Deployment Templates – Domain Specific IoTs – Home Automation – Cities - - Environment – Energy –
Retail – Logistics – Agriculture – Industry – Health & Lifestyle.
Unit-2 - Sensors and Actuators 9 Hour
Definitions - Classification of Sensors and Actuators – Gathering Requirements for Interfacing – Performance Characteristics of Sensors and Actuators: Input and Output Characteristics – Temperature Sensors and
Thermal Actuators – Optical Sensors and Actuators – Electric and Magnetic Sensors and Actuators.
Unit-3 - Classification of Sensors and Actuators 9 Hour
Mechanical Sensors and Actuators – Acoustic Sensors and Actuators – Chemical Sensor and Actuators – Radiation Sensors and Actuators – MEMS and Smart Sensors: Production of MEMS – MEMS Sensors
and Actuators – Smart Sensors and Actuators – Sensor Networks.
Unit-4 - Microcontrollers 9 Hour
Interfacing Methods and Circuits – Amplifiers, Digital Circuits, Bridge Circuits, Data Transmission, Excitation Methods, and Circuits – Interfacing to Microprocessors: General Purpose Controller, General
requirements for interfacing sensors and actuators - ESP8266, Node MCU, TI-CC3200, Access point and station point mode, HTTP, MQTT, transmission and receiving, Intel-Gallileo boards.
Unit-5 - IoT Applications 9 Hour
Application Domains of IoT – IoT based Smart Home Framework – IoT and Health care – IoT and Smart Mobility – Car Parking System – Major Instances of Crop Growth and IoT - IoT Architecture of Smart
Agriculture – Smart Grid – IoT-based Smart Cities – IoT and Smart Education

321
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Arshdeep Bahga and Vijay Madisetti, “Internet of Things, A Hands -on Approach”, 1st 4. Agus Kurniawan, “Smart Internet of Things Projects”, Packt publishing, 2016.
Edition, Vpt Publisher, 2014. 5. Peter Waher, “Learning Internet of Things”, Packt publishing, 2015.
Learning 2. Nathan Ida, “Sensors, Actuators, and their Interfaces: A multidisciplinary Introduction”, 6. Muhammad Azhar Iqbal, Sajjad Hussain, Huanlai Xing and Muhammad Ali Imran, “Enabling
Resources Institution of Engineering and Technology Publishing, 2020. the Internet of Things: Fundamentals, Design and Applications”, Wiley Publications, 2021.
3. Jacob Fraden, “Handbook of Modern Sensors: Physics, Designs, and Applications”, Springer
International Publishing, 2015.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 35% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Rajachozhan, Zoho Corp, Chennai 1. Dr. B. Surendiran, NIT, Puducherry 1. Ms. P. Mahalakshmi, SRMIST
2. Mr. Adarsh B, IoT Domain Expert, Happiest Mind 2. Dr. Nagendra Kumar S, Associate Professor, University of Hyderabad, 2. Dr. A. Suresh. SRMIST
Technologies, Hyderabad. Telangana

322
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course INTRODUCTION TO EMBEDDED PROGRAMMING AND Course L T P C
21CSE265T E PROFESSIONAL ELECTIVE
Code Name EMBEDDED OS Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: identify the basics of Embedded Programming and GNU C Programming Tool Chain in Linux 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: solve program using Embedded C and Micro Python for Embedded programming

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: articulate basic open-source software, packages, and simulation tools

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: recognize Embedded programming on open-source boards

Environment &
Sustainability
CLR-5: define Embedded Operating systems and its importance in Embedded product design

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: classify and demonstrate expertise on C programming tool chain - - 3 2 - - - - - - - - 3 3 -
CO-2: perceive to write python codes for Embedded applications - - 3 2 - - - - - - - - 3 3 -
demonstrate the knowledge acquired can choose and apply appropriate Operating systems for the
CO-3: - - 3 2 - - - - - - - - 3 3 -
context of requirement
convert in programming with logical acumen the open-source boards for any problem in Embedded
CO-4: - - 3 2 - - - - - - - - 3 3 -
industries
extend the required programming skills that enhances their chances of employability in Embedded and
CO-5: - - 3 2 - - - - - - - - 3 3 -
IoT Industries

Unit-1 - Introduction to Embedded Programming and GNU C Programming Tool Chain 9 Hour
Introduce Object oriented programming with C: Basic skeleton, Header libraries for projects, ports, preprocess, basic sample codes; Steps of compilation; Handling time constraints: create delays (Hardware and
Software) - timeout mechanism: loops and hardware - Introduction to GCC - Debugging with GDB - The Make utility - GNU Configure and Build System - GNU Binary utilities - Profiling - using gprof - Introduction
to GNU C Library
Unit-2 - Introduction to Python Programming on Open-Source Board for Embedded Systems 9 Hour
Introduction to basic Python programming: Variables, Basic operators, reading input from user, Basic datatypes, Conditional and control statement -Introduce basic open-source hardware: Arduino (or any recent
version including NodeMCU), Raspberry Pi, PyBoard; Introduce basic port programming with Raspberry Pi/Arduino/NodeMCU for Embedded application;
Unit-3 - Introduction to Micro Python for Embedded Systems 9 Hour
Introduction to Micro Python programming: High level comparison on Python standard libraries and micro-libraries, MicroPython-specific libraries, Port-specific libraries; Micro python on Microcontrollers; Micro
Python programming with PyBoard and Node MCU
Unit-4 - Introduction to Simulation Tools for Embedded Development 9 Hour
Introduction to Matlab; Embedded Programming with Matlab: Building Arduino/Raspberry Pi/ESP8266(NodeMCU) with Matlab, Introduce and demo using Embedded MATLAB Mex; Introduction to Proteus: Basic
programming with Proteus and Raspberry Pi (or any open-source hardware)
Unit-5 - Introduction to Embedded Operating Systems 9 Hour
Embedded Operating systems: Introduction, Types, Characteristics, Advantages and Disadvantages; Introduction to Real time operating systems (RTOS), Task Scheduling, Survey of RTOS

323
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Michael J Pont, “Embedded C”, Pearson Education, 2007. 4. Nicholas H. Tollervey, “Programming with Micro Python: Embedded Programming with
Learning 2. Barr, “Programming Embedded Systems: With C and GNU Development Tools”, Second Microcontrollers and Python”, O’Reilley Publishers, 2017
Resources Edition, O’Reilley Publishers, 2006 5. K.C. Wang, “Embedded and Real-Time Operating Systems”, Springer International
3. https://www.labcenter.com/raspberry_pi/ Publishing, 2017.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 35% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Thirukkumaran Raman, Head – R&D, IIoT COE, 1. Dr. Manju Khari, Jawaharlal Nehru University, New Delhi 1. Dr. Kayalvizhi Jayavel, SRMIST
Chools Group, Bangalore
2. Mr. Rajachozhan, Zoho Corp, Chennai 2. Dr. T. M. Thasleema, Professor, Department of CSE, Central 2. Dr. R. Kayalvizhi, SRMIST
University of Kerala.

324
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE266T INTERNET OF THINGS ARCHITECTURE AND PROTOCOLS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: identify M2M & IoT analytics along with IoT and its applications 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: solve IoT Technical design constraints and its interaction with remote control

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: recognize knowledge of different layers in IP based and Web communication protocols

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: label the Transport Layer protocols in depth and Clous based services

Environment &
Sustainability
CLR-5: state the real-world problems in IoT

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: outline the essentials of IoT and its applications - 3 3 - - - - - - - - - 2 2 -
CO-2: summarize IoT Architecture Reference model and its control - 3 3 - - - - - - - - - 2 2 -
CO-3: examine the IP based protocols and Authentication Protocols for IoT - 3 3 - - - - - - - - - 2 2 -
CO-4: handle different layered protocols in IoT and cloud-based services - 3 3 - - - - - - - - - 2 2 -
CO-5: experiment real world problems in IoT with Arduino and Raspberry Pi - 3 3 - - - - - - - - - 2 2 -

Unit-1 - Architecture and Framework of IoT 9 Hour


IoT- An Architectural Overview, Applications of IoT, IoT Conceptual framework, Design Principles, Standards and Considerations, M2M fundamentals, IoT Technologies, M2M and IoT analytics, Challenges of IOT
and Sources of IoT.
Unit-2 - Standardization of IoT 9 Hour
IoT/M2M System layers, Design Standardization, The IoT Architectural Reference Model as Enabler, IoT in Practice, IoT in Logistics and Health, Functional and communication models, Real-World Design
Constraints, Technical Design constraints and Interaction and remote control.
Unit-3 - Authentication and Communication 9 Hour
Web communication protocols for connected devices, Message communication protocols for connected devices, web connectivity for connected-devices network using gateway Internet connectivity principles, IP
addressing in IoT, Proxy authentication, Media Access control, Application Layer Protocols and Zigbee smart energy.
Unit-4 - Cloud Based Services in IoT 9 Hour
Transport layer: SCTP-TLS, DCCP, Data acquiring and storage, Organizing the data, Knowledge Acquiring, Managing and Storing processes, Cloud computing paradigm for data collection, IoT cloud-based services
and Data enrichment.
Unit-5 - IoT Devices in Real Time Scenario 9 Hour
Security in IoT Protocols, Radio frequency identification technology, Wireless Sensor Networks, Introduction to Arduino, Arduino IDE, Node MCU, Introduction to Raspberry Pi, 6LoWPAN and RPL

325
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Pethuru Raj and Anupama C. Raman “The Internet of Things: Enabling Technologies, 4. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, and Jerome Henry,
Platforms, and Use Cases”, CRC Press, 2017 “IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of
Learning 2. Arshdeep Bahga and Vijay Madisetti “Internet of Things: A Hands-on Approach”, Universities Things”, CISCO Press, 2017.
Resources Press, 2015. 5. Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis Karnouskos and
3. Qusay F. Hassan, “Internet of Things A to Z: Technologies and Applications”, John Wiley & David Boyle, “From Machine-to-Machine to the Internet of Things: Introduction to a New Age
Sons, 2018. of Intelligence”, 1st Edition, Academic Press, 2014.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 35% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. G. Pradeep, Intel @ FICE, Bangalore 1. Dr. Sudeepta Mishra, Indian Institute of Technology, Ropar, Punjab 1. Dr. A. Suresh, SRMIST
2. Mr. Adarsh B, Happiest Minds Technologies, Hyderabad 2. Dr. P. Rajesh, Professor, Central University of Kerala. 2. Dr. C. Malathy, SRMIST

326
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE365T MACHINE LEARNING FOR IoT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: restate the basic theory underlying machine learning 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
recognize the general concepts of Internet of Things and recognize various devices, sensors, and
CLR-2:

Environment & Sustainability


applications

The engineer and society


Conduct investigations of
CLR-3: grasp machine learning algorithms to solve problems of moderate complexity

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


articulate to design, build, and integrate IoT platforms, incorporating different types of sensors,

Modern Tool Usage


CLR-4:

Life Long Learning


complex problems
Problem Analysis
actuators, and machine learning methods

Communication
define the current requirements of applied machine learning with IoT and the issues raised by current
CLR-5:
research

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: summarize the basic theory underlying machine learning - 2 - - 3 - - - - - - - - 3 3
CO-2: solve general concepts of Internet of Things and recognize various devices, sensors, and applications - 2 - - 3 - - - - - - - - 3 3
CO-3: analyze machine learning algorithms to solve problems of moderate complexity - 2 - - 3 - - - - - - - - 3 3
estimate to build and integrate IoT platforms, incorporating different types of sensors, actuators, and
CO-4: - 2 - - 3 - - - - - - - - 3 3
machine learning methods
differentiate the framework for current requirements of applied machine learning with IoT and the issues
CO-5: - 2 - - 3 - - - - - - - - 3 3
raised by current research

Unit-1 – Machine Learning and its Models 9 Hour


Introduction to Machine Learning: Definition of learning systems, Goals and applications of machine learning, Aspects of developing a learning system: training data, concept representation, Role of machine
intelligence in IoT, Machine Learning Models: Bayesian classifiers, Nearest-neighbor classifiers, Linear and Polynomial classifiers, Random forests, Decision trees, Support vector machines, Dimensionality reduction
methods, K-mean clustering, Artificial neural networks, Deep neural networks
Unit-2 - IoT- Data Analytics 9 Hour
Internet of Things: Data Analytics, IoT analytics challenges, IoT data acquisition, Data Exploration and Pre-processing, IoT technologies, Architecture and Networking protocols, IoT Communication Technologies,
Devices and Gateways
Unit-3 - Sensor and Actuators 9 Hour
Overview of Sensors working, Analog and Digital Sensors, Interfacing of Temperature, Humidity, Motion, Light and Gas Sensor with Arduino, Interfacing of Actuators with Arduino, Interfacing of Relay Switch and
Servo Motor with Arduino
Unit-4 - Computing Framework 9 Hour
Fog computing, Edge computing, Cloud computing, Characteristics of Cloud Computing, Driving factors towards cloud, Architecture, Role of Networks in Cloud computing, protocols used, Role of Web services,
Service Models: IaaS, PaaS, SaaS, NaaS, Cloud Clients, Deployment Models: Public Clouds, Community Clouds, Hybrid Cloud, Private Cloud, Issues in Cloud Computing, Applications, Distributed computing.

327
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Machine Learning Applications with IoT 9 Hour
Applications of Machine learning in smart cities: Use cases - Smart energy, Smart mobility, Smart citizens, Urban planning, Smart city data characteristics, and applied machine learning algorithms to Internet of
Things use cases.

1. Vijay Madisetti and Arshdeep Bahga, “Internet of Things: A Hands-on Approach”, University 4. Madhumathy P, M Vinoth Kumar and R. Umamaheswari “Machine Learning and IoT for
Press, 2014. Intelligent Systems and Smart Applications,” CRC Press, 2021.
2. C.M. Bishop, “Pattern Recognition and Machine Learning”, Springer, 2006.J. Watt, R. 5. D. Barber, “Bayesian Reasoning and Machine Learning”, Cambridge University Press, 2012.
Learning
Borhani, and A. K. Katsaggelos “Machine Learning Refined: Foundations, Algorithms and 6. Michael Stanley and Jongmin Lee “Sensor Analysis for the Internet of Things”, Morgan &
Resources
Applications”, 1st Edition, Cambridge University Press, 2016. Claypool Publishers, 2018.
3. Andrew Minteer “Analytics for the Internet of Things (IoT) Intelligent Analytics for your 7. Raj Kamal, “Internet of Things: Architecture and Design”, McGraw Hill, 2017.
Intelligent Devices”, Packet Publishing, 2017. 8. Cuno Pfister, “Getting Started with the Internet of Things”, Oreilly Media, 2011.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 35% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Vignesh, TCS, Bangalore 1. Dr. E. Ilavarasan, Puducherry Technological University, Puducherry. 1. Dr. M. Shobana, SRMIST
2. Mr. Adarsh B, Happiest Minds Technologies, Hyderabad 2. Dr. T. M. Thasleema, Professor, Department of CSE, 2. Dr. A. Suresh. SRMIST
Central University of Kerala.

328
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course INTRODUCTION TO CLOUD APPLICATION DEVELOPMENT FOR Course L T P C
21CSE366T E PROFESSIONAL ELECTIVE
Code Name IoT Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: compare the concepts of cloud computing 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: perceive the basic knowledge on developing cloud applications

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: define the concepts of Internet of Things

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: state the knowledge on integrating cloud in IoT platform

Environment &
Sustainability
CLR-5: outline the smart computing of developed IoT applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: memorize the cloud computing services and their models - - 3 2 - - - - - - - - - 3 3
CO-2: distinguish the different applications in the cloud environment - - 3 2 - - - - - - - - - 3 3
CO-3: examine the architecture of IoT and identify the challenges - - 3 2 - - - - - - - - - 3 3
CO-4: implement the concept of IoT cloud convergence in Azure cloud environment - - 3 2 - - - - - - - - - 3 3
CO-5: demonstrate the cloud-based IoT applications in various domains - - 3 2 - - - - - - - - - 3 3

Unit-1 - Introduction to Cloud Computing 9 Hour


Introduction – Characteristics of Cloud Computing – Cloud Models – Service Models, Deployment Models - Cloud Service Examples – IaaS – PaaS – SaaS - Cloud-based Services and Applications - Cloud Concepts
and Technologies.
Unit-2 - Developing for Cloud 9 Hour
Cloud services and Platforms - Cloud Application Design - Design considerations for cloud applications - Reference Architectures for Cloud Applications - Cloud Application Design Methodologies - Data Storage
Approaches – Cloud Application Development in Python
Unit-3 - Introduction to IoT 9 Hour
Overview of IoT – IoT Architecture – Smart Computing – IoT Design: Issues and Challenges – Internet of Things Application Development – Application Development Phases – Wireless Technologies for IoT –
Protocol Stack – Electronic Platforms – Developing IoT Applications
Unit-4 - IoT Cloud Convergence 9 Hour
Introduction-Opportunities and Challenges – Architecture for Convergence – Data Offloading and Computation: An IoT Perspective – Dynamic Resource Provisioning – Security aspects in IoT Cloud Convergence
- Test Beds and Technologies – Developing IoT Applications in Azure.
Unit-5 - Smart Computing Over IoT - Cloud 9 Hour
Introduction-Big Data Analytics and Cognitive Computing – Deep Learning Approaches – Algorithms, Methods, and Techniques, Case Studies, Enterprise Use Cases for Digital Transformation: Oil and gas industry
transformation – License management system – Smart Campus

329
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Arshdeep Bahga and Vijay Madisetti, “Cloud Computing: A Hands-On Approach”, University 3. Rekha Kodali, Dr. Gopala Krishna Behara, Sankara Narayanan Govindarajulu “Developing
Press, 2016. Cloud Native Applications in Azure using, NET Core,” BPB Publications, 2020.
Learning
2. Parikshit N. Mahalle, Nancy Ambritta P., Gitanjali Rahul Shinde, and Arvind Vinayak 4. Monika Mangla, Suneeta Satpathy, Bhagirathi Nayak and Sachi Nandan Mohanty,
Resources
Deshpande, “The Convergence of Internet of Things and Cloud for Smart Computing”, “Integration of Cloud Computing with Internet of Things”, Willey Publications, 2021.
Newgen Publishing UK, 2022.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 35% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Thirukkumaran Raman, IIoT COE, Chools Group, Bangalore 1. Dr. P. Anandhakumar, Anna University, MIT Campus, Chennai 1. Dr. S. Thenmalar, SRMIST
2. Mr. Adarsh B, Happiest Minds Technologies, Hyderabad 2. Dr. E. Ilavarasan, Puducherry Technological University, Puducherry. 2. Dr. A. Suresh. SRMIST

330
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE367T IoT FORENSICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
sense the software vulnerabilities and security solutions to reduce the risk of exploitation in the IoT Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
Devices

Environment & Sustainability


CLR-2: state the performance and troubleshoot cyber security systems

The engineer and society


Conduct investigations of
classify and execute risk management processes, risk treatment methods, and key risk and performance

Individual & Team Work


Engineering Knowledge
CLR-3:

Design/development of

Project Mgt. & Finance


indicators

Modern Tool Usage

Life Long Learning


complex problems
articulate knowledge to secure corrupted systems, protect personal data, and secure computer networks

Problem Analysis
CLR-4:

Communication
in an organization
CLR-5: perceive with an expertise in academics to design and implement security solutions

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify the cyber security needs of an organization - 3 3 - - - - - - - - - 2 2 -
CO-2: recite key terms and concepts in Cryptography, Governance and Compliance - 3 3 - - - - - - - - - 2 2 -
practice cyber security solutions and use of cyber security, information assurance, and cyber/computer
CO-3: - 3 3 - - - - - - - - - 2 2 -
forensics software/tools
CO-4: understand IoT security architecture and investigate cybercrime issues - 3 3 - - - - - - - - - 2 2 -
CO-5: analyze the importance of IoT security in future and in agile development - 3 3 - - - - - - - - - 2 2 -

Unit-1 - Overview of Digital Forensics 9 Hour


Introduction to Digital Forensics, branches of digital forensics, digital evidence, Types of Evidence, Chain of custody, types of Cyber Crime, types of cyber criminals, crime scene management, evidence collection
techniques - Switched Off System, Live System, Live response and triage-based acquisition techniques, order of volatility.
Unit-2 - Evidence Collection 9 Hour
Analysis of evidence, concept of imaging and cloning, file formats of forensic images, concept of write blocker, Hardware and Software Write blocker, Hash Function, fuzzy hash and hash collision, data recovery,
tools for image creation and analysis.
Unit-3 - File Artifacts 9 Hour
MFT analysis, recycle bin forensics, i30 analysis, other NTFS artifacts - data, UsnJrnl, amcache, shimcache, shellbags, lnk files, jump lists, USB, and Bring Your Own Device (BYOD) Forensic Examinations, Incident
response procedure, browser forensics, printer artifacts, yellow dot concept in printer forensics.
Unit-4 - IoT Device Architecture 9 Hour
Introduction to Internet of Things, IoT Architecture, Characteristics of IoT, IoT Security Challenges and Factors of Threat, Effects of IoT Security Breach, Role of Digital Forensics in Cybercrime Investigation for IoT,
IoT in Digital Forensic, Digital Forensics Investigation Framework for IoT Devices, Road Map for Issues in IoT Forensics, IoT Security Steps, How to Access IoT Security.

331
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - IoT Security 9 Hour
Introduction to IoT Sensors: Security in Network Forensics, Cybersecurity Versus IoT Security and Cyber-Physical Systems , The IoT of the Future and the Need to Secure , The Future—Cognitive Systems and the
IoT , Security Engineering for IoT Development , Building Security Into Design and Development , Security in Agile Developments , Focusing on the IoT Device in Operation , Cryptographic Fundamentals for IoT
Security Engineering , Types and Uses of Cryptographic Primitives in the IoT , Encryption and Decryption , Symmetric Encryption , Asymmetric Encryption , Digital Signatures.

1. Darren R. Hayes, “A Practical Guide to Computer Forensics Investigations”, Pearson 4. Amelia Phillips, Bill Nelson, and Christopher Steuart, “Guide to Computer Forensics and
Publisher, 2014. Investigations”, Fifth Edition, Cengage Learning, 2015.
2. Eoghan Casey, “Digital Evidence and Computer Crime: Forensic Science, Computers and 5. Rohatgi, Shipra, and Sakshi Shrivastava, “A Generic Digital Scientific Examination System
Learning Book”, 3rd Edition, Academic press, 2011. Eoghan Casey, “Handbook of Digital Forensics for Internet of Things”,
Resources and Investigation”, Academic press, 2009. 6. Digital Forensics and Internet of Things: Impact and Challenges, pp: 87-110, Wiley, 2022.
3. Michael Hale Ligh, Andrew Case, Jamie Levy, A. Aron Walters “The Art of Memory 7. Karthika. D, “IoT Sensors: Security in Network Forensics,” Digital Forensics and Internet of
Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory”, 1st Things: Impact and
Edition, John Wiley&Sons, 2014. 8. Challenges, pp: 111-129, Wiley, 2022.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 35% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Anand Gurupatham, Renault Nissan, Chennai 1. Dr. Arulprakash, Professor, IIT Madras 1. Dr. C.N.S. Vinoth Kumar, SRMIST
2. Dr. Saravanan, Mahindra & Mahindra, Chennai 2. Dr. Raju Abraham, NIOT, Chennai 2. Dr. P. Madhavan. SRMIST

332
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE368J NETWORK PROGRAMMING FOR IoT E PROFESSIONAL ELECTIVE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: articulate strong Practical skill on Raspberry Pi 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: identify the Python programming Environment for Raspberry Pi

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: perceive the basics of Cloud for IOT

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: implement Raspberry with the networks

Environment &
Sustainability
CLR-5: engage small projects using IOT devices

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: hands on Hardware interfacing with Raspberry Pi - - 2 - 3 - - - - - - - - 3 3
CO-2: configuration of Python on Raspberry Pi - - 2 - 3 - - - - - - - - 3 3
CO-3: practice AWS for IoT - - 2 - 3 - - - - - - - - 3 3
CO-4: implement the Networking of Raspberry Pi - - 2 - 3 - - - - - - - - 3 3
CO-5: analyze and Demonstrate Real – time IoT systems with Python and Java - - 3 - 3 - - - - - - - - 3 3

Unit-1 - Raspberry PI 12 Hour


Introduction to Raspberry Pi: Getting Started with Raspberry Pi: Basic functionality of Raspberry Pi, setting up the board, booting Raspberry Pi 3, Downloading an Operating System, format an SD card and booting
the OS, Interfacing Hardware with the Raspberry Pi, Raspberry Pi Remote Access, Bash Command line.
Unit-2 - Python for IoT 12 Hour
Python: Basics of Python programming language: Programming on the Raspberry Pi. Python on Raspberry Pi, Python Programming Environment - Micro Python: Features, Limitations, Experimenting with Python
on PC, Installing Python 3 on Windows 10, Running the Python Console, Running Python Programs with the Interpreter.
Unit-3 - Cloud Storage for IoT 12 Hour
Introduction - Communication API - WAMP: AutoBahn for IoT - Xively Cloud for IoT - Python Web Application Framework: Djanjo - Amazon Web Services for IoT - Case Studies: Weather Monitoring system.
Unit-4 - Powering PI 12 Hour
Installing Raspbian – formatting SD Cards – Connecting Raspberry Pi – Networking your Raspberry Pi, via Wireless Network – Creating Simple Raspberry Pi Application
Unit-5 - Case Study Projects 12 Hour
NetBeans – Introduction, Downloading and Configuring NetBeans, Revisiting Hello Raspberry Pi - Binary Timer – IOT Hat – Building Motion Activated Alarm System with Python

333
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Lab Experiments
1. Installation and Booting of Raspberry Pi
2. Interfacing Raspberry Pi with the Operating System
3. Sensing the available networks
4. Basics commands in Raspberry Pi
5. Python Programming on Raspberry Pi
6. Expressions, Functions, Strings
7. Sense the Finger using Raspberry Pi
8. Temperature Notification using Raspberry Pi
9. MySQL Database Installation in Raspberry Pi
10. SQL Queries by Fetching Data from Database in Raspberry Pi
11. Switch Light on and Off Based on the Input of User Using Raspberry Pi
12. Connecting Raspberry Pi through Wireless Networks
13. Downloading and configuring NetBeans
14. Weather Monitoring System
15. Mini - Project

1. Simon Monk, “Programming the Raspberry Pi: Getting Started with Python”, McGraw Hill 3. Stephen Chin and James L Weaver, “Rasberry Pi with Java: Programming the Internet of
Learning Professional, 2012 Things (IOT)”, McGraw-Hill, 2015
Resources 2. Charles Bell, “Micro Python for the Internet of Things, A Beginner’s Guide to Programming 4. Jason Van Schooneveld, “Build Physical Projects with Python on the Raspberr Pi”, 2020.
with Python on Microcontrollers”, Apress, 2017. https://realpython.com/python-raspberry-pi/

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 20% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 15% - -
Level 6 Create - - - 05% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Anand Gurupatham, Renault Nissan, Chennai 1. Dr. Arulprakash, Professor, IIT Madras 1. Dr. S. Thanga Revathi, SRMIST
2. Dr. Saravanan, Mahindra & Mahindra, Chennai 2. Dr. Raju Abraham, NIOT, Chennai 2. Dr. Mary Subaja Christo, SRMIST

334
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course INTRODUCTION TO SECURITY OF INTERNET OF THINGS AND Course L T P C
21CSE369J E PROFESSIONAL ELECTIVE
Code Name CYBER-PHYSICAL SYSTEMS Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: restate the basics of security challenges for IoT and Cyber Physical Systems 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: recognize about the IoT Economy and the Need for IoT Security

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: state the Secured IoT Systems Architectures

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: define the secured connectivity in IoT Systems

Environment &
Sustainability
CLR-5: articulate towards Privacy and Access Control for IoT Security

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: outline the security challenges in IoT and CPS Platforms - - 3 2 - - - - - - - - - 3 3
CO-2: report the importance of IoT security in IoT Economy - - 3 2 - - - - - - - - - 3 3
CO-3: examine the Various Architectures in the IoT Systems - - 3 2 - - - - - - - - - 3 3
CO-4: classify the communication protocols and analyze their security concerns in Industrial IoT - - 3 2 - - - - - - - - - 3 3
CO-5: investigate the privacy and Access control in IoT Systems - - 3 2 - - - - - - - - - 3 3

Unit-1 - Security Challenges in IoT and Cyber Physical Systems 12 Hour


IoT Architectures, Properties and Security Requirements – Constrained Application Protocol – Datagram Transport Layer Security – Cyber Physical Systems (CPS) and Communications – CPS Models and Security
Aspects – CPS Security Threats
Unit-2 - IoT Economy and Need for IoT Security 12 Hour
IoT System – IoT Components and Need for Security – Analyzing the Mirai Attack – Defending IoT Castle – Attacking IoT Castle and Breach Consequences – Understanding the IoT Economy and Cybercriminal
Economy – Cryptocurrency and where Cybercriminal go to hide
Unit-3 - Architecting Secured IoT Systems 12 Hour
IoT System Architecture – IoT: Low-Cost System – IoT Architecture Layers – Fundamental Cloud Architecture and Security Architecture in IoT Systems – Security Architecture Process – Security Concerns of
Industrial IoT
Unit-4 - Secure Connections 12 Hour
Connectivity in IoT – IoT Communication Protocol Classifications – Network Security for IoT – Security Analysis for Protocols – AI and IoT Unite – Safe Driving App meets Smart Fridge
Unit-5 - Privacy and Access Control 12Hour
Information Privacy – Personal Information and Personal Knowledge – Privacy Controls – Privacy Legislations –Challenges of IoT Security Usability – Principles for Designing Usable IoT Security Controls

335
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Lab Experiments
1. Wireshark filters and PCAP inspection
2. Nmap scan of an IoT device and exploitation with Metasploit
3. Burp Suite interception on IoT web portal for exposed secrets
4. Using Postman to send password data to an IoT API
5. Exploiting an IoT portal for consumer-grade devices
6. Injecting commands into vulnerable IoT web services
7. Obtaining and analyzing Specification Sheets
8. Sniffing serial and SPI
9. Recovering firmware from PCAP
10. Recovering filesystems with binwalk
11. Pillaging the filesystem
12. WiFi PSK cracking
13. BLE device interaction
14. Zigbee traffic capture
15. Conducting a replay transmission attack on IoT

1. Song Guo, Deze Zeng, “Cyber-Physical Systems: Architecture, Security and Application,” 4. Roshani Raut, Sandeep Kautish, Zdzislaw Polkowski, Anil Kumar, Chuan-Ming Liu, “Green
Springer, First Edition, 2019 Internet of Things and Machine Learning,”
Learning
2. David M Wheeler Damilare D Fagbemi and JC Wheeler, “The IoT Architect’s Guide to 5. Scrivener Publishing, Wiley, 2022.
Resources
3. Attainable Security and Privacy,” CRC Press Taylor & Francis Group, First Edition, 2020. 6. Anand Tamboli, “Build Your Own IoT Platform Develop a Flexible and Scalable Internet
of Things Platform”, Second Edition, Apress, 2022.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 20% 30% -
Level 4 Analyze 30% - - 35% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. R. Lenin Babu, Conversight.Ai, USA, 1. Dr. K. Selvakumar, Professor, Annamalai University, 1. Dr. C. Rajesh Babu, SRMIST
2. Mr. U. Aravind Kumar, JPA Solutions, Bangalore, 2. Dr. K. G. Srinivasa, Professor, NITTR Chandigarh, 2. Dr. B. Balakiruthiga, SRMIST

336
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE370J DATA VISUALIZATION FOR IoT E PROFESSIONAL ELECTIVE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: relate the various types of data, apply, and evaluate the principles of data visualization 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: convert skills to visualization Techniques to a problem

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: retrieve structured approach to create effective visualization

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: extend valuable insight from the massive dataset using visualization

Environment &
Sustainability
CLR-5: label interactive visualization for better insight using visualization tools

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: list the different data types, visualization types to bring out the insight and create, interpret plots - 3 - 2 - - - - - - - - 2 2 -
CO-2: interpret the visualization towards the problem based on the dataset to bring out valuable insight - 3 - 2 - - - - - - - - 2 2 -
CO-3: demonstrate the analysis of a large dataset using various visualization techniques and tools - 3 - - 2 - - - - - - - 2 2 -
CO-4: solve the streaming visualization Techniques for large scale data - 3 - 2 - - - - - - - - 2 2 -
CO-5: categorize various visualizations for geospatial and to Design visualization dashboard - - 3 2 - - - - - - - - 2 2 -

Unit-1 - Introduction to Data Visualization and its Techniques 12 Hour


Overview of data visualization -Data Abstraction - Task Abstraction - Analysis: Four Levels for Validation. Visualization Techniques- Scalarand Point techniques–Colormaps– Contouring–Height Plots-Vector
visualization techniques–Vector properties–Vector Glyphs–Vector Color Coding–Matrix visualization techniques.
Unit-2 - Visual Analysis and Types 12 Hour
VisualVariables-NetworksandTrees-MapColorandOtherChannels-ManipulateView-Heat Map. Time- Series data visualization – Text data visualization – Multivariate data visualization and case studies.
Unit-3 - Visualization Tools and Techniques 12 Hour
Introduction to various data visualization tools: R –basics, Data-preprocessing, Statistical analysis, Plotly and ggplot library, Tableau, D3.js, Gephi.
Unit-4 - Visualization of Streaming Data 12 Hour
Best practices of Data Streaming, processing streaming data for visualization, presenting streaming data, streaming visualization techniques, streaming analysis.
Unit-5 - Geo-Spatial Visualization and Dashboard Creations 12 Hour
Chloropleth map, Hexagonal Binning, Dotmap, Cluster map, cartogram map, Dashboard creation using visualization tools for the IOT related use case applications.

337
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Lab Experiments
1. A Study on R-programming tool
2. A study on the Data Visualization Techniques
3. Experiments on Acquiring and plotting data using R.
4. Perform Correlation regression and analysis of variance on a dataset and visualize the results
5. Explore Statistical Analysis- Multivariate Analysis
6. Explore on the various libraries used for Text processing and perform Text visualization
7. Perform PCA on a dataset and visualize the results
8. A study on Tableau and Gephi. Tools
9. Preparing and training data based on K-means clustering analysis using R
10. Using R programming deploy Histogram and Heat-map on a Streaming dataset and provide proper inference
11. Experiment on Time-series analysis for stock market dataset
12. Experiment on Visualization of massive dataset generated from IOT related applications
13. Experiment on Visualization on Streaming dataset such as Stock market dataset, weather forecasting
14. Perform effective visualization using Chloropleth map, Dotmap, and Cluster map
15. Perform Dashboard creation for an IOT application using visualization tools

1. Aragues Anthony, “Visualizing Streaming Data: Interactive Analysis Beyond Static Limits”, 3. Tamara Munzer, “Visualization Analysis and Design”, CRC Press, 2014.
Learning O’Reilly Media, Inc., 2018. 4. Christian Toninski, Heidrun Schumann, “Interactive Visual Data Analysis”, CRC press
Resources 2. Dr. Chun-hauh Chen, W.K.Hardle, A. Unwin, “Hand book of Data Visualization”, Springer publication, 2020.
publication, 2016. 5. Alexandru C. Telea, “Data Visualization: Principles and Practice”, AK Peters, 2014.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 30% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Albert Rex, @HP Company, Chennai 1. Dr. Ameer, National Institute of Technology, Calicut 1. Dr. K. Nimala, SRMIST
2. Mr. Rajachozhan, Zoho Corp, Chennai 2. Dr. Raju Abraham, NIOT, Chennai 2. Mr. V. Nallarasan SRMIST

338
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE371J IoT TECHNIQUES, TOOLS, AND ITS APPLICATION E PROFESSIONAL ELECTIVE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: restate the phases in developing a flexible and scalable IoT Platform 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: label the software defined approach to IoT

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: conclude the IoT Eco Systems and Services

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: grasp the role of Blockchain in IoT

Environment &
Sustainability
CLR-5: articulate towards Green IoT Applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: discuss and define IoT Eco-System - - 2 - 3 - - - - - - - - 3 3
CO-2: examine the IoT services and challenges - - 2 - 3 - - - - - - - - 3 3
CO-3: exploit Blockchain and standards in IoT - - 2 - 3 - - - - - - - - 3 3
CO-4: demonstrate Software Defined Internet of Everything in smart city - - 2 - 3 - - - - - - - - 3 3
CO-5: summarize Green IoT Applications - - 2 - 3 - - - - - - - - 3 3

Unit-1 - IoT Eco-Systems 12 Hour


IoT Reference Framework – OSI Model for IoT – IoT Requirements for Networking Protocols – IoT Protocol Stack: Link Layer and Internet Layer, IoT Protocol Stack: Application Protocols Layer, IoT Protocol Stack:
Application Services Layer.
Unit-2 - IoT Services and Challenges 12 Hour
IoT Services Platform and Manager – Manager Discovery and Communications Manager – Element, Firmware, Topology and Group Manager – IoT Security Challenges and Requirements – IoT Domain Architecture,
Attacks and Countermeasures – IoT Verticals
Unit-3 - Blockchain and Standards in IoT 12 Hour
Blockchain – Evolution and Anatomy of Blockchain – Features of Blockchain – Blockchain Applications in IoT – Blockchain Security in IoT – Industry Organizations and Standards Landscape
Unit-4 - Software Defined Internet of Everything 12 Hour
Internet of Everything- Smart city Integrated Perspective – Traditional Network Architecture – SDN Network Architecture – Application Scenario Analysis – Architecture and Deployment Models of SDN Protocols -
Network Policies for Internet of Everything
Unit-5 - Green IoT 12 Hour
Green IoT and ML for Smart Computing – Machine Learning based Smart Applications- Lifecycle of Green IoT – Applications, Challenges and Opportunities for Green IoT – Machine Learning Enabled Techniques
for Energy Consumption of IoT Devices – Energy Efficient Routing Infrastructure for Green Computing

339
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Lab Experiments
1. A Study on R-programming tool
2. A study on the Data Visualization Techniques
3. Experiments on Acquiring and plotting data using R.
4. Perform Correlation regression and analysis of variance on a dataset and visualize the results
5. Explore Statistical Analysis- Multivariate Analysis
6. Explore on the various libraries used for Text processing and perform Text visualization
7. Perform PCA on a dataset and visualize the results
8. A study on Tableau and Gephi. Tools
9. Preparing and training data based on K-means clustering analysis using R
10. Using R programming deploy Histogram and Heat-map on a Streaming dataset and provide proper inference
11. Experiment on Time-series analysis for stock market dataset
12. Experiment on Visualization of massive dataset generated from IOT related applications
13. Experiment on Visualization on Streaming dataset such as Stock market dataset, weather forecasting
14. Perform effective visualization using Chloropleth map, Dotmap, and Cluster map
15. Perform Dashboard creation for an IOT application using visualization tools

1. Ammar Rayes and Samer Salam, “Internet of Things from Hype to Reality”, Third Edition, 3. Roshani Raut, Sandeep Kautish, Zdzislaw Polkowski, Anil Kumar and Chuan-Ming Liu,
Learning Springer, 2022 “Green Internet of Things and Machine Learning”, Scrivener Publishing, Wiley, 2022
Resources 2. Gagangeet Singh Aujla, Sahil Garg Kuljeet Kaur and Biplab Sikdar, “Software Defined 4. Anand Tamboli, “Build Your Own IoT Platform Develop a Flexible and Scalable Internet
Internet of Everything”, First Edition, Springer, 2022. of Things Platform”, Second Edition, Apress, 2022.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 30% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr R Lenin Babu, Conversight.Ai, USA, 1. Dr. K. Selvakumar, Professor, Annamalai University, 1. Dr. C. Rajesh Babu , SRMIST
2. Mr. U. Aravind Kumar, JPA Solutions, Bangalore, 2. Dr. K. G. Srinivasa, Professor, NITTR Chandigarh, 2. Dr. B. Balakiruthiga, SRMIST

340
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE467T ADVANCED DATABASE SYSTEMS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
restate the Fundamentals of Internet of Things and its technologies and Distributed processing Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
techniques for IoT
CLR-2: label the uses of Machine Learning in IoT, DL framework and cloud platforms for IoT

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: state the deep learning applications for IoT, Image Recognition.Speech/ Voice Recognition

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: articulate indoor localization and state detection techniques with available classifier

Environment &
Sustainability
CLR-5: grasp deep learning techniques in real time examples

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: classify the basic theory underlying in Internet of Things - - 2 3 - - - - - - - - 2 3 -
CO-2: describe the Deep learning techniques in IoT and its limitations - - 2 3 - - - - - - - - 2 3 -
CO-3: solve deep learning algorithms and problems of moderate complexity - - 2 3 - - - - - - - - 2 3 -
analyze Indoor Localization and IoT based human psychological and psychological state detection using
CO-4: - - 2 3 - - - - - - - - 2 3 -
Deep Learning Techniques
CO-5: investigate security attacks in IoT and detections, with real time examples - - 2 3 - - - - - - - - 2 3 -

Unit-1 - Introduction 9 Hour


Internet of Things - Data Analytics, IoT analytics challenges, IoT data acquisition, Data Exploration and Pre-processing, IoT technologies, Architecture and Networking protocols, IoT Communication – Data Access
and Distributed processing for IoT.
Unit-2 - IoT Ecosystems, Deep Learning Techniques, and Frameworks 9 Hour
The End-to-End Life Cycle of the IoT - IoT application domains- The key characteristics and requirements of IoT data – Realtime Examples - Deep Learning Architectures for IoT - A soft introduction to ML - ML tasks
- Delving into DL - Artificial neural networks - Neural network architectures - DL frameworks and cloud platforms for IoT – Limitations of IoT devices, edge/fog computing, and cloud perspective.
Unit-3 - Deep Learning Application for IoT 9 Hour
Image Recognition in IoT - IoT applications and image recognition - Transfer learning for image recognition in IoT - CNNs for image recognition in IoT applications - Audio/Speech/Voice Recognition in IoT -
Speech/voice recognition for IoT - DL for sound/audio recognition in IoT - CNNs and transfer learning for speech recognition in IoT applications
Unit-4 - Indoor Localization and State Detection 9 Hour
Indoor Localization in IoT - An overview of indoor localization - Techniques for indoor localization - DL-based indoor localization for IoT - K-nearest neighbor (k-NN) classifier - AE classifier - Physiological and
Psychological State Detection in IoT - IoT-based human physiological and psychological state detection - Deep learning for human activity and emotion detection in IoT - LSTM, CNNs, and transfer learning for
HAR/FER in IoT applications - Data collection - Data exploration - Data preprocessing - Model training - Model evaluation.
Unit-5 - IoT Security 9 Hour
Security attacks in IoT and detections - Anomaly detection and IoT security - DL for IoT security incident detection - DNN, autoencoder, and LSTM in IoT security incidents detection - Advanced Aspects and Analytics
in IoT - Predictive Maintenance for IoT - DL for predicting RLU – Realtime Examples - Deep Learning in Healthcare IoT - CNN and LSTM in healthcare applications – Deep Learning for Smart Cities IoT- Deep
Learning for Industrial IoT
341
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Mohammad Abdur Razzaque and Md. Rezaul Karim, “Hands on Deep Learning for IoT”, 4. Vijay Madisetti, Arshdeep Bahga, “Internet of Things: A Hands-on Approach”, University
Learning First Edition, Packet Publishing Ltd, 2019. Press, 2014
Resources 2. Amita Kapoor, “Hands on Deep Learning for IoT”, First Edition, Packet Publishing Ltd, 2019 5. Andrew Minteer, “Analytics for the Internet of Things (IoT) Intelligent Analytics for Your
3. Cuno Pfister, “Getting Started with the Internet of Things”, Oreilly Media, 2011. Intelligent Devices”, Packt Publishing, 2017

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 35% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. R. Lenin Babu, Conversight. AI, USA. 1. Dr. K. G. Srinivasa, Professor, NITTR Chandigarh, 1. Dr. Meenakshi K, SRMIST
2. Mr. Vignesh, TCS, Bangalore 2. Dr. E. Ilavarasan, Puducherry Technological University, Puducherry. 2. Dr. M. Shobana, SRMIST

342
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE468T EDGE COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: compare the concepts and technologies of IoT and Edge 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: state IoT and M2M communication

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: outline the protocols and standards of IoT and Edge

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: label the edge computing Architecture and its components

Environment &
Sustainability
CLR-5: recognize the integration of Edge and Cloud Computing for IoT

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: distinguish the concepts and technologies of IoT and Edge - - 3 2 - - - - - - - - 3 3 -
CO-2: summarize the IoT and M2M Communication - - 3 2 - - - - - - - - 3 3 -
CO-3: hands on practice on Arduino and RaspberryPi - - 3 2 - - - - - - - - 3 3 -
CO-4: investigate the different cloud and edge analytics - - 3 2 - - - - - - - - 3 3 -
CO-5: demonstrate the Edge computing integration with Cloud and IoT in an industrial application - - 3 2 - - - - - - - - 3 3 -

Unit-1 - IoT and Edge Computing 9 Hour


Introduction to IoT – IoT Applications – Challenges in IoT – Introduction to Edge Computing – Need for Edge Computing – Challenges in Edge Computing
Unit-2 - Edge Architecture and Protocols 9 Hour
IoT Architecture – IoT versus Machine-to-Machine communication – IoT and Edge architecture - IoT and Edge Protocols – MQTT, COAP, AMQP, Low Power Lossy Network Routing, HTTP– Communication methods
– Bluetooth, Zigbee, 6LowPAN, LoRaWAN, 5G, WiFi.
Unit-3 - Modelling and Simulation 9 Hour
ESP32, Arduino, RaspberryPi: Introduction, RaspberryPi Board: Hardware Layout and Pinouts, Operating Systems on RaspberryPi, Edge to Cloud Protocols, MQTT, MQTT publish- subscribe, MQTT architecture
details, MQTT state transitions, MQTT packet structure, MQTT data types, MQTT communication formats –Introduction to fog Computing – Relationship between Edge and Fog with Cloud Computing - Fog/Edge
Simulator: iFogSim, Edge CloudSim, Cloud4Net
Unit-4 - Big Data Analytics in Edge Computing 9 Hour
Big Data – Data Types in Big Data – Characteristics of big data – Benefits – Applications – Big Data Layered Architecture – Big Data Implementation: Hortonworks, Cloudera, MAP R – Edge Analytics – Benefits of
Edge analytics – Difference between cloud analytics and edge analytics
Unit-5 - Case Study / Industrial Applications 9 Hour
Edge for Continuous Motion Recognition – Edge for Recognition of Sound from audio – Edge analytics in Irrigation System – IoT-Edge for Smart Energy Management – Edge analytics in Remote Monitoring and
Maintenance for an industry – Edge analysis in Healthcare System – Smart Building.

343
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. K. Anitha Kumari, G. Sudha Sadasivam, D. Dharani, and M. Niranjanamurthy “Edge 3. .http://rucon.ec.tuwien.ac.at/files/Aral,%20De%20Maio%20-%202020%20-
Computing: Fundamentals, Advances and Applications”, (Advances in Industry 4.0 and %20Simulators%20and%20Emulators%20for%20Edge%20Computing.pdf
Learning
Machine Learning), 1st Edition, CRC Press, 2021. 4. https://arxiv.org/ftp/arxiv/papers/1910/1910.03026.pdf
Resources
2. Rajkumar Buyya and Satish Narayana Srirama, “Fog and Edge Computing: Principles and 5. Ripon Patgiri, Sivaji, and M.D. Borah “Edge Analytics,” Springer,
Paradigms”, Wiley, 2019. https://link.springer.com/book/10.1007/978-981-19-0019-8, 2022.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 35% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. U. Aravind Kumar, JPA Solutions, Bangalore. 1. Dr. M. D. Selvaraj, Indian Institute of Information Technology, Chennai 1. Mrs. V. Vijayalakshmi, SRMIST
2. Mr. U. Aravind Kumar, JPA Solutions, Bangalore, 2. Dr. K. G. Srinivasa, Professor, NITTR Chandigarh, 2. Dr. A. Suresh. SRMIST

344
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE469T ENERGY MANAGEMENT FOR IoT DEVICES E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: restate the rudiments of energy conservation and IoT 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: state the knowledge on various energy conservation schemes in IoT

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: utilize the conventional and optimization algorithms for conserving energy in IoT devices

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: find the various techniques of green IoT and impact of conventional techniques of IoT

Environment &
Sustainability
CLR-5: articulate the knowledge on existing energy efficient architecture for energy conservation and harvesting

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: interpret the knowledge on IoT and energy conservation approaches in IoT - 3 - 2 - - - - - - - - 2 3 -
CO-2: choose appropriate energy conservation component for real world problems - 3 - 2 - - - - - - - - 2 3 -
CO-3: experiment the appropriate energy conservation algorithms for improving the lifetime of IoT devices - 3 - 2 - - - - - - - - 2 3 -
CO-4: analyze various green IoT techniques and able to design green IoT for real world problems - 3 - 2 - - - - - - - - 2 3 -
CO-5: develop and demonstrate energy efficient architecture for real world problems - 3 - 2 - - - - - - - - 2 3 -

Unit-1 - Introduction 9 Hour


Introduction to IoT, Architecture of IoT, Components of IoT, Applications of IoT, Challenges in IOT, Energy Management in IoT, Energy harvesting, Block diagram of energy harvesting, Various ambient energies,
Energy harvesting schemes, Harvesting modules, Rectenna Model, Sensing antenna, DC-DC Converter, Wireless energy harvesting, Near Field Communication, Inductive coupling, Paradigmatic view of energy
efficient IoT, Pragmatic energy efficient IoT system architecture.
Unit-2 - Energy Conservation Schemes 9 Hour
Energy conservation schemes, Sleep/wakeup scheme, Data driven scheme, Mobility based scheme, Load balancing, Working of load balancing, Hardware based load balancing, Software Based Load Balancing,
Compare hardware and software based load balancing techniques, Load balancing algorithms, Static Algorithms, Dynamic Algorithms, Issues of energy conservation in IoT, Basic model of smart home system,
Energy Conservation in Smart Home and IoT, Automation and Sensors in Smart Home, Case study: energy conservation component for smart home
Unit-3 - Algorithms for Conserving Energy 9 Hour
Static energy efficient algorithms, Exact allocation algorithm, Best Fit Heuristic Algorithm, Dynamic energy efficient algorithms, Hardware Level Solution, Dynamic Voltage Frequency Scaling (DVFS), Software Level
Solution, First Fit Decreasing algorithm (FFD), Modified Best Fit Decreasing algorithm (MBFD), Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Simulated Annealing
(SA), Cat Swarm Optimization(CSO), Hybrid Genetic Algorithm and Cat Swarm Optimization (HGACSO), Hybrid Genetic Algorithm, Particle Swarm Optimization and Simulated annealing(HGAPSOSA), Comparison
of dynamic energy efficient algorithm, Compare and contrast static and dynamic energy efficient algorithms.
Unit-4 - Green IoT 9 Hour
Green IoT an Overview, Smart Homes, Smart Cities, Energy Efficient smart health care, Importance of Green IOT, Taxonomy of green IoT techniques, Various Approaches to Achieve Green IoT, software based
green IoT techniques, Hardware based green IoT techniques, Policy based techniques, Awareness based Approach - Toward Green IoT, Energy Awareness, IoT Based Smart Metering, Communication Technology
Creating Awareness About Green Information, Promoting Recycling, Habitual Based Techniques, Comparative analysis of different green IoT approaches, Case study: impact of smart phones on the environment
in present and future trends.
345
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Selected Applications of Energy Systems 9 Hour
Designing energy efficient IoT based Intelligent Transport System, Intelligent Transport System, Motivations for IoT in Transportation, Communication Technology and Related Power Issues, Information Extraction
and Underlying Power Issues, Energy Efficiency Challenges and Corresponding Solutions, Further Challenges and Opportunities, Capacity Estimation of Electric Vehicle Aggregator for Ancillary Services,
Development of Electric Vehicles, Motivation for Vehicle to Everything (V2X) and V2G Technology, Electric Vehicles and Solar Power Plants in Smart Grid Environment, Potential of EV to Grid Connection, Capacity
Estimation of Aggregator, Battery Management System, Grid Connection and Performance Testing of V2G.

1. Mamta Mittal, Sudeep Tanwar, Basant Agarwal, Lalit Mohan Goyal, “Energy Conservation for 3. Rushan Arshad, Saman Zahoor, Munam Ali Shah, Abdul Wahid and Hongnian Yu,
Learning IoT Devices Concepts, Paradigms and Solutions” Springer Singapore, 2019. “Green IoT: An Investigation on Energy Saving Practices for 2020 and beyond,”
Resources 2. Madhur.B, “IoT projects with Bluetooth Low Energy - Harness the power of connected things” Special Section on Future Networks: Architectures protocols and applications, IEEE
Packt Publishing, 2017. Publisher, 2017.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 35% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Aparna, TCS, Kolkata. 1. Dr. Arulprakash, Professor, IIT Madras 1. Dr. V Anbarasu, SRMIST
2. Mr. U. Aravind Kumar, JPA Solutions, Bangalore, 2. Dr. K. G. Srinivasa, Professor, NITTR Chandigarh, 2. Dr. A. Suresh. SRMIST

346
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE470T APPLIED SOFTWARE TECHNIQUES IN IoT ENGINEERING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: distinguish the phases of data gathering and management of IoT Platform 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: solve the software integration of communication protocol HTTP, MQTT

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: state the CoAP and integrating the Edge computing and Interoperability

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: label the role of cloud service provider and taming the IoT

Environment &
Sustainability
CLR-5: articulate towards IoT Applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: outline the phases of data gathering and state data management concepts of IoT Platform - - 2 3 - - - - - - - - 2 3 -
CO-2: summarize Software Integration of communication protocol used in IoT - - 2 3 - - - - - - - - 2 3 -
CO-3: appraise the CoAP to integrate the edge devices and interoperability - - 2 3 - - - - - - - - 2 3 -
CO-4: implement a scenario using emerging cloud computing technologies - - 2 3 - - - - - - - - 2 3 -
CO-5: inspect the IoT Applications and its performances - - 2 3 - - - - - - - - 2 3 -

Unit-1 - Sensing Technologies 9 Hour


Getting Started – Definition – Setting up, Initial Edge Tier Applications – Design Concepts, Data Simulation – Simulating Sensors and Actuators and its application, Data Emulation – Emulating sensors and actuators,
Data Management – Data Translation and Management concepts
Unit-2 - Communication Technologies 9 Hour
Introducing the MQTT protocol – Preparing – Publishing – Checking encrypted communication – Adding MQTT support to the actuator - Testing MQTT - Security considerations - MQTT Integration – Java client.
Introducing the HTTP protocol - Creating an HTTP server - Adding dynamic synchronous resources - Adding dynamic asynchronous resources
Unit-3 - Interoperability 9 Hour
CoAP – Adding CoAP to the devices - CoAP Server Implementation - CoAP Client Integration – Concepts, Edge Integration – adding TLS – add security. Benefits of interoperability – Achieving interoperability using
CoAP – Adding LWM2M – Testing LWM2M device
Unit-4 - Emerging Cloud Computing Technologies 9 Hour
Integrating with various cloud services – Programming – integrating with an IoT CSP – Taming the IoT. XMPP – Adding XMPP – Connecting to broker – Data available – Publishing – Adding chat interface – Testing.
Unit-5 - Product Life Cycle and use Cases 9 Hour
Defining ownership of data – understanding provisioning – Adding – Managing – tokens for identification – Testing. Use case: Home Environment monitoring and temperature adjustment, Garden monitoring and
water adjustment, pond quality monitoring.

347
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Andy King A., “Programming the Internet of Things: An Introduction to building integrated 3. Anand Tamboli, “Build your own IoT platform: develop a fully flexible and scalable internet of
Learning device-to-cloud IoT solutions”, O'Reilly Media, Inc.", 2021. things platform”, 2nd edition, AK press, 2019.
Resources 2. Peter Waher, “Mastering Internet of Things: Design and create your own IoT applications 4. Ahmed Bakir, “Program the Internet of Things with Swift for IOS - Learn How to Program
using Raspberry Pi 3”, Packet Publishing Ltd., 2018. Apps for the Internet of Things,” AK press, 2018.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 35% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Mohan Raj, Renault Nissan Technology & business 1. Dr. P.T.V.B. Bhuvaneswari, Professor, MIT Campus, Anna University. 1. Dr. Kayalvizhi R, SRMIST
Centre Private Limited, Chennai,
2. Mr. S. Santosh Kumar, Associate Consultant, CGI, 2. Dr. S. Sudha, Associate Professor, Anna University, Chennai, 2. Dr. S. Ushasukhanya, SRMIST
Bangalore,

348
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE471T FUNDAMENTALS OF CYBER SECURITY E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: restate the basic terminology, concepts, and standards of cyber security 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: state the understanding on software application security

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: label the Concepts for secure information systems

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: outline the Information Security Policies, Standards, and Cyber Law

Environment &
Sustainability
CLR-5: sense the modern theory on Security in Emerging Technology

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: describe the information, principles, standards of cyber security - - 3 2 - - - - - - - - - 3 2
CO-2: practice the data security considerations in real time applications - - 3 2 - - - - - - - - - 3 2
CO-3: illustrate security concerns in developing Secure Information Systems - - 3 2 - - - - - - - - - 3 2
CO-4: analyze Information Security Policies, Standards, and Cyber Law - - 3 2 - - - - - - - - - 3 2
CO-5: investigate the Security used in emerging technologies - - 3 2 - - - - - - - - - 3 2

Unit-1 - Introduction to Information Systems 9 Hour


Introduction to Information Systems, Types of Information Systems, Development of Information Systems, Changing the Nature of Information Systems Introduction to information security, Need for Information
Security, Threats to Information Systems, Information Assurance, Cybersecurity and Security Risk Analysis
Unit-2 - Cybersecurity Application Security 9 Hour
Application Security, Data Security Considerations: Backups, Archival, Security Technology, Intrusion Detection, Denial-of-Service (DOS) Attack, Security Threats, Security Threats to E-Commerce, Electronic
Payment Systems, Digital Signature, Cryptography
Unit-3 - Developing Secure Information Systems 9 Hour
Secure Information System Development, Application Development Security, Information Security Governance and Risk Management, Security Architecture and Design, Security Issues in Hardware, Data Storage,
and Downloadable Devices, Physical Security of its Assets, Back-Up Security Measures
Unit-4 - Information Security Policies, Standards, and Cyber Law 9 Hour
Security Policies, Policy Review Process, Information Security Standards, Cyber Laws in India, Intellectual Property Law, Semiconductor Law, Software Licenses
Unit-5 - Security in Emerging Technology 9 Hour
Security of Big Data Analytics, Security of Cloud Computing, Security of Internet of Things (IoT), Security of Smart Grid, Security of Scada Control Systems, Security of Wireless Sensor Networks (WSNs)

349
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. C. P. Gupta and K. K. Goyal, “Cyber security: A Self-Teaching Introduction”, 1st Edition, 3. Charles J. Brooks, Christopher Grow, Philip Craig and Donald Short, “Cybersecurity
Mercury Learning, and Information Press, 2020. Essentials,” First Edition, John Wiley & Sons publishers, 2018.
Learning
2. Charles P. Pfleeger, Shari Lawrence Pfleeger, and Jonathan Margulies, “Security in 4. William Stallings, “Cryptography and Network Security Principles and Practices,” Seventh
Resources
Computing”, Fifth Edition, Prentice Hall, 2015. edition, Pearson, 2017
5. Man, Ho Au, Raymond Choo, “Mobile Security and Privacy,” Syngress Publications, 2016.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 35% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. G. Pradeep, Intel @ FICE, Bangalore. 1. Dr. Sudeepta Mishra, Indian Institute of Technology, Ropar, Punjab 1. Dr. N. Prasath SRMIST
2. Mr. P.J Sanakaranarayanan, Security Analyst, Philips, Bangalore. 2. Mr. Karthikeyan.C.M.T, Government College of Engineering, Bargur 2. Mr. J. Prabakaran, SRMIST

350
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE472J FULL STACK DEVELOPMENT FOR IoT E PROFESSIONAL ELECTIVE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: restate the IoT components for full stack development 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: identify the techniques for designing the prototype application

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: perceive the hardware and software for developing full stack

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: define the protocol communication from underlying network layer to User interface

Environment &
Sustainability
CLR-5: solve real time application prototypes

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: list the components of IoT framework and open-source platforms - - 3 - 2 - - - - - - - - 3 3
CO-2: summarize the hardware design for the IoT prototype - - 3 - 2 - - - - - - - - 3 3
CO-3: illustrate the software concepts into designed hardware components - - 2 - 2 - - - - - - - - 3 3
CO-4: analyze the required protocol communication for data transmission - - 3 - 2 - - - - - - - - 3 3
CO-5: construct a prototype with dashboard for real time problem statements and measure its performance - - 3 - 2 - - - - - - - - 3 3

Unit-1 – IoT Application Development Overview 12 Hour


Components of IoT framework- Creative Coding Platforms - Open-Source Platforms - Mobile phones and similar devices - Arm Devices - Basic Electronics (circuit theory, measurements, parts identification) Sensors
and Software: Why full stack development? Interfacing to the Real World
Unit-2 - Prototype Hardware Development 12 Hour
Transducers, Classification, Roles of sensors in IOT, Various types of sensors, designing with sensors and boards, special requirements for IOT sensors, Role of actuators, types of actuators-Different IoT protocols
features and uses, Physical device – Arduino Interfaces, GPIO Basics, Programming, APIs / Packages
Unit-3 - Prototype Embedding 12 Hour
Preparing the development environment (Arduino IDE), Exploring the Arduino language (C/C++) syntax, Coding, compiling, and uploading to the microcontroller, Working with Arduino Communication Modules:
Bluetooth Modules, WIFI Modules, Interfacing Arduino and Blynk via USB like LED Blinking, temperature monitoring applications
Unit-4 - Integrating WIFI/Protocol Module 12 Hour
ESP8266 WIFI Serial Module: Overview, Setting Up the Hardware, Interfacing with Arduino, Creating an IoT Temperature and Humidity Sensor SystemESP32, Arduino, RaspberryPi: Introduction, RaspberryPi
Board: Hardware Layout and Pinouts, Edge to Cloud Protocols, like MQTT
Unit-5 - Application Development and Development 12 Hour
Checking Data communication with IoT cloud/edge computing, Creation and interface of Dashboard, Analytics, Addition of intelligence to the prototype, working on improving performance metrics

351
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Lab Experiments
1. Exploring the concepts IoT and edge with basic any two applications like Switching ON/OFF Light, 9. Study of RaspberryPi and Beagle board
monitoring temperature in a room 10. Detect the Vibration of an Object Using Arduino
2. Illustrate the IoT and M2M communication 11. Develop an application for Smart agriculture with full stack techniques
3. Integration of protocols and standards of IoT and Edge 12. Develop an application for Smart city with full stack techniques
4. Development of IoT-Edge computing application like smart dustbin, smart water monitoring, smart door 13. Develop an application for Industry 4.0 with full stack techniques
5. Extend the application from the integration of Edge to cloud 14. Develop an application for Traffic control/parking with full stack techniques
6. Illustrate the protocols between IoT and cloud 15. Develop an application for Object/Human detection with full stack techniques
7. Integration of security mechanisms in the developed applications
8. MySQL Database Installation in Raspberry Pi

1. Bernardo Ronquillo Japón, “Learn IoT Programming Using Node-RED: 3. D. Dharani, G. Sudha Sadasivam, K. Anitha Kumari and M. Niranjanamurthy, “Edge Computing:
Begin to Code Full Stack IoT Apps and Edge Devices with Raspberry Pi, Fundamentals, Advances and Applications (Advances in Industry 4.0 and Machine Learning)”, First Edition,
Learning
NodeJS, and Grafana”, PBP Publishers, 2022 CRC Press, 2021
Resources
2. Anand Tamboli, “Build Your Own IoT Platform Develop a Flexible and 4. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, and Jerome Henry, “IoT Fundamentals:
Scalable Internet of Things Platform”, Second Edition, Apress, 2022 Networking Technologies, Protocols, and Use Cases for the Internet of Things”, CISCO Press, 2017

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 10% 15% -
Level 2 Understand 25% - - 25% 25% -
Level 3 Apply 30% - - 20% 30% -
Level 4 Analyze 30% - - 35% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Goutham, Head, Innovation and Technology, 1. Dr. K. Suganya Devi, National Institute of Technology, Silchar, Assam 1. Dr. Vaishnavi Moorthy, SRMIST
Protohubs.IO, Head
2. Mr. Dinesh Krishna- Senior System Design Engineer, IoT, 2. Dr. Ameer, National Institute of Technology, Calicut 2. Mrs. Ushasukhanya S, SRMIST
Robotics & AI, Auxo Technology Labs

352
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE473T DEEP LEARNING FOR IoT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
restate the Fundamentals of Internet of Things and its technologies and Distributed processing Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
techniques for IoT
CLR-2: label the use of Machine Learning in IoT, DL framework and cloud platforms for IoT

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: solve the deep learning applications for IoT Image Recognition.Speech/ Voice Recognition

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: identify the indoor localization and state detection techniques with available classifier

Environment &
Sustainability
CLR-5: perceive deep learning techniques in real time examples

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: describe the basic theory underlying in Internet of Things - 3 - - 3 - - - - - - - - 3 3
CO-2: summarize Deep learning techniques in IoT and its limitations - 3 - - 3 - - - - - - - - 3 3
CO-3: apply deep learning algorithms to solve problems of moderate complexity - 3 - - 3 - - - - - - - - 3 3
analyze Indoor Localization and IoT based human psychological and psychological state detection using
CO-4: - 3 - - 3 - - - - - - - - 3 3
Deep Learning Techniques
CO-5: scrutinize security attacks in IoT and detections, with real time examples - 3 - - 3 - - - - - - - - 3 3

Unit-1- Introduction 9 Hour


Internet of Things - Data Analytics, IoT analytics challenges, IoT data acquisition, Data Exploration and Pre-processing, IoT technologies, Architecture and Networking protocols, IoT Communication – Data Access
and Distributed processing for IoT.
Unit-2- IoT Ecosystems, Deep Learning Techniques, and Frameworks 9 Hour
The End-to-End Life Cycle of the IoT - IoT application domains- The key characteristics and requirements of IoT data – Realtime Examples - Deep Learning Architectures for IoT -A soft introduction to ML - ML tasks
- Delving into DL - Artificial neural networks - Neural network architectures - DL frameworks and cloud platforms for IoT – Limitations of IoT devices, edge/fog computing, and cloud perspective.
Unit-3- Deep Learning Application for IoT 9 Hour
Image Recognition in IoT - IoT applications and image recognition - Transfer learning for image recognition in IoT - CNNs for image recognition in IoT applications - Audio/Speech/Voice Recognition in IoT -
Speech/voice recognition for IoT - DL for sound/audio recognition in IoT - CNNs and transfer learning for speech recognition in IoT applications.
Unit-4- Indoor Localization and State Detection 9 Hour
Indoor Localization in IoT - An overview of indoor localization - Techniques for indoor localization - DL-based indoor localization for IoT - K-nearest neighbour (k-NN) classifier - AE classifier - Physiological and
Psychological State Detection in IoT - IoT-based human physiological and psychological state detection - Deep learning for human activity and emotion detection in IoT - LSTM, CNNs, and transfer learning for
HAR/FER in IoT applications - Data collection - Data exploration - Data pre-processing - Model training - Model evaluation.
Unit-5 - IoT Security 9 Hour
Security attacks in IoT and detections - Anomaly detection and IoT security - DL for IoT security incident detection - DNN, autoencoder, and LSTM in IoT security incidents detection - Advanced Aspects and Analytics
in IoT - Predictive Maintenance for IoT - DL for predicting RLU – Realtime Examples - Deep Learning in Healthcare IoT - CNN and LSTM in healthcare applications – Deep Learning for Smart Cities IoT- Deep
Learning for Industrial IoT
353
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Mohammad Abdur Razzaque and Md. Rezaul Karim, “Hands on Deep Learning for IoT”, 4. Vijay Madisetti and Arshdeep Bahga, “Internet of Things: A Hands-on Approach”, University
Learning First Edition, Packt Publishing Ltd, 2019. Press, 2014
Resources 2. Amita Kapoor, “Hands on Deep Learning for IoT”, First Edition, Packt Publishing Ltd, 2019. 5. Andrew Minteer “Analytics for the Internet of Things (IoT) Intelligent Analytics for Your
3. Cuno Pfister, “Getting Started with the Internet of Things,” Oreilly Media, 2011. Intelligent Devices”, Packt Publishing, 2017.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 35% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. R. Lenin Babu, Conversight.Ai, USA. 1. Dr. K. Selvakumar, Professor, Annamalai University, 1. Dr. N. Krishnaraj, SRMIST
2. Mr. U. Aravind Kumar, JPA Solutions, Bangalore, 2. Dr. K. G. Srinivasa, Professor, NITTR Chandigarh, 2. Dr. P. Vigneshwaran, SRMIST

354
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE474T IoT PRIVACY E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: distinguish the fundamentals, various attacks, trust models and importance of security aspects in IoT 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: state the basics of cryptographic algorithms required for IoT security

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: solve the techniques, protocols, and some ideas on security towards gaming model

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: articulate the relevance of Blockchain, its techniques towards IoT

Environment &
Sustainability
CLR-5: perceive the essential components of IoT and its privacy challenges

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: describe the best practices learnt to identify the attacks and mitigate the same - - 3 - - - - 2 - - - - - 3 2
CO-2: identify the role of cryptographic algorithms to achieve required IoT security - - 3 - - - - 2 - - - - - 3 2
CO-3: analyze the security techniques and protocols during the design of IoT products and gaming designs - - 3 - - - - 2 - - - - - 3 2
CO-4: classify about the skills learnt on ciphers and blockchains when appropriate - - 3 - - - - 2 - - - - - 3 2
CO-5: investigate the appropriate IoT devices for a real time case study - - 3 - - - - 2 - - - - - 3 2

Unit-1 - Fundamentals of IoT Security and its Trust Models 9 Hour


Security requirements in IoT architecture, security in enabling technologies, security concerns in IoT applications, security architecture in the IoT, security requirements in IoT, insufficient authentication/authorization,
insecure access control, threats to access control, privacy and availability, attacks specific to IoT. Vulnerabilities, attack, counter measures, and fault trees, the secure IoT system implementation lifecycle, Data
trustworthiness in IoT, Human IoT trust relationship, Trust and reputation system, trust negotiation, IoT privacy preservation issues
Unit-2 - Cryptographic Fundamentals for IoT 9 Hour
Cryptographic basics and its key role in IoT, mathematical foundations, Encryption and decryption, public-key cryptography, elliptic curve arithmetic, elliptic curve cryptography, message integrity, authentication
algorithms, hash functions, Digital signature algorithms – Markle Trees signature algorithms, crypto currencies, bitcoin P2P network, security credential management system (SCMS).
Unit-3 - Privacy Preservation for IoT 9 Hour
Prevent unauthorized access to sensor data, M2M security, FRID security, cyber physical object security, Hardware security, Front-end system privacy protection, management, secure IoT databases, Networking
function security, IoT networking protocols, Secure IoT lower layers, secure IoT higher layers, Secure communication, links in IoTs, Back-end security, secure resource, Game theory foundation, Mixed-strategy,
Nash equilibrium, repeated games, Bayesian games, coalitional games.
Unit-4 - Block Chain in Iot Security 9 Hour
Introduction to Blockchain, Modelling faults and adversaries, Byzantine generals’ problem, Consensus algorithms and their scalability problems, digital signatures, verifiable random functions, Zero-knowledge
systems blockchain, the challenges and solutions, proof of work, proof of stake, alternatives to Bitcoin consensus, bitcoin scripting language and their us Ethereum and smart contracts, Smart contract languages
and verification challenges, comparing Bitcoin scripting Vs. Ethereum smart contracts, Hyper ledger fabric, mechanisms in permissioned blockchain, pseudo-anonymity Vs. anonymity, Zcash and Zk-SNARKS for
anonymity preservation, attacks on blockchains, Sybil attacks, selfish mining, 51% attacks.

355
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - IoT Devices and its Privacy 9 Hour
Introduction of IoT devices, Difference among IoT devices, computers and embedded devices, Sensors and actuators in IoT, Accelerometer, photo resistor, buttons, motor, LED, vibrator, analog signal Vs. digital
signal, Networking in IoT, Real-time communication, Bandwidth efficiency, data analytics in IoT- simple data analyzing methods, IoT architecture, component and technology, Case study- discussion on specific IoT
applications and their design considerations, cyber security overview in IoT, general cyber security concepts in IoT security threads in IoT, data privacy in IoT, device/user authentication in IoT, data trustworthiness
problem in IoT.

1. B. Rusell and D. VanDuren, “Practical Internet of Things Security”, Packt Publishing, 2016. 6. Helena Rodrigues, Kristof Van Laerhoven and Rui José, “Security and the IoT ecosystem”,
2. FeiHU, “Security and Privacy in Internet of Things (IoTs): Models Algorithms and Springer International Publishing, 2019.
Implementations”, CRC Press, 2016. 7. Baldini, Gianmarco, “Internet of Things: IoT Governance, Privacy and Security Issues”,
Learning 3. Narayanan, “Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction”, European Research Cluster, 2015
Resources Princeton University Press, 2016. 8. Ollie Whitehouse, “Security of Things: An Implementers' Guide to Cyber-Security for Internet
4. Antonopoulos, “Mastering Bitcoin: Unlocking Digital Cryptocurrencies”, O’Reilly, 2014. of Things Devices and Beyond”, NCC Group, 2014.
5. T.Alpcan and T.Basar, “Network Security: A Decision and Game-theoretic Approach”, 9. Josh Thompson, “Blockchain: The Blockchain for Beginnings, Guild to Blockchain Technology
Cambridge University Press, 2011. and Blockchain Programming”, CreateSpace Independent Publishing Platform, 2017.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 35% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. R. Lenin Babu, Conversight. Ai, USA. 1. Dr. Ansumanmahapatra, National Institute of Technology, Puducherry 1. Mrs. G. Sujatha, , SRMIST
2. Mr. U. Aravind Kumar, JPA Solutions, Bangalore. 2. Dr. K. G. Srinivasa, Professor, NITTR Chandigarh, 2. Dr. T.Y.J. Naga Malleshwari SRMIST

356
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

UNDERGRADUATE/ INTEGRATED POST


GRADUATE DEGREE PROGRAMMES
(With exit option of Diploma)

(Choice Based Flexible Credit System)

Regulations 2021

Volume – 11I
(Syllabi for Computer Science and Engineering w/s in
Blockchain Technology Programme Courses)

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

357
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Core Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

358
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC305T BLOCKCHAIN USING CRYPTOGRAPHY C PROFESSIONAL CORE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic services and concepts related to Blockchain Networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: define the role of cryptography in Blockchain network

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: highlighting the services and techniques Ethereum and Cryptocurrency concept in Blockchain

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: presenting the functions of Cryptocurrency in Blockchain Networks

Environment &
Sustainability
CLR-5: acquire knowledge in Networking concept and its part using Blockchain concepts

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: comprehend the knowledge of communication in Blockchain 3 3 - - - - - - - - - - - - 2
CO-2: identify and design the different Cryptographical algorithms using Blockchain 3 2 1 - - - - - - - - - - - 3
CO-3: design the network concepts and implement protocols using Blockchain - 2 3 - 1 - - - - - - - - - 1
CO-4: describe the role of Ethereum and Cryptocurrency using Blockchain 2 2 - - 1 - - - - - - - - - 2
CO-5: implement the various AI techniques in Blockchain 2 2 1 - - - - - - - - - - - 1

Unit-1 - Introduction 9 Hour


Distributed Database, Limitations of Distributed Database, Two General Problem- Byzantine General problem and Fault Tolerance- Introduction to Ledgers, Working of financial systems- Introduction about Block
Chain technologies- Difference between block chain with database , History of Block Chain-Characteristics of Block Chain - Distributed Ledger and Block Chain - Comparison of Distributed Ledger and Block Chain-
Types of Block Chain - Blockchain Network and Nodes - Overview of Blocks - Structure of Block – Examples
Unit-2 - Blockchain Functionality 9 Hour
Hashing in Blockchain – techniques - Linking Box - Linking Box using SHA - Block Structures - Blockchain Functionality - Creating Blockchain - Digital Structures in Blockchain - Creating Identity – Examples -
Signatures in transactions - Asset ownerships in transactions - Blockchain wallet - Crypto Exchange - Differences Between Crypto Wallets vs Exchanges
Unit-3 - P2P Networking 9 Hour
Peer to Peer Networking - Working of Peer-to-Peer Networking - Measures to ensure the security of P2P networking systems - Introduction to Peer-to-Peer networking - History of Peer-to-Peer networking – Examples
- Architecture of Peer-to-Peer networking - Network Discovery - Types of P2P networks in Blockchain - Examples of P2P networks in Blockchain - P2P Crypto Exchanges - P2P Marketplaces vs. OTC Exchanges -
Building a sample blockchain using P2P network – Example - Creation of New block - Validation of New Block – Example
Unit-4 - Introduction of Cryptocurrency 9 Hour
Introduction about Cryptocurrency - History of Cryptocurrency - Distributed Ledger - Bitcoin Protocols - Mining strategy and Rewards – Ethereum - Construction and working of Bitcoin - Construction and working of
Ethereum - DAO, Smart contract - GHOST, Vulnerability Attacks, Side Chain, Name coin - Cryptocurrency Regulation: stakeholders-Roots of bitcoin - Legal Aspects - Cryptocurrency Exchange - Black market and
Global Economy - Implementing Blockchain as service
Unit-5 - Real Time Examples 9 Hour
Implementing Blockchain as service using AI concepts - Enterprise Ethereum Alliance - Ethereum Alliance practical demo - Understanding Ethereum Jargon - Ethereum default Admin Site - Smart contracts in
Aselpius - Developing smart contracts - Real Time Examples - Procedure to apply AI concept in Blockchain - Examples.
359
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Gulshan Shrivastava, Dac-Nhuong Le, Kavita Sharma “Cryptocurrencies and 4. Arvind Narayanan, Joesph Bonnecau, Edward Felten, Andrew Miller and Steven
Blockchain Technology Applications” Wiley publishers, 2020. Goldfeder.”Bitcoin and cryptocurrency technologies: A comprehensive Introduction” Princeton
Learning 2. Koushik Raj, “Foundation of Blockchain: The pathway to Cryptocurrencies and University Press, 2016
Resources Decentralised blockchain applications “, Kindle Edition, 2019. 5. Cryptography Engineering: Design Principles and Practical Applications, Niels Ferguson, Bruce
3. Daniel Dresher “Blockchain Basics A non technical Introduction in 25 steps” 2017 A Schneier, and Tadayoshi Kohno, John Wiley & Sons Inc; 1st edition ,2010
press publishers

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Imthyaz Serif, Director IDEASSION Technology solutions, Chennai 1. Dr. L. Ramanathan, Associate Professor, VIT Vellore 1. Dr. SV.Shri Bharathi, SRMIST

360
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Elective Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

361
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE231T FUNDAMENTALS OF BLOCKCHAIN E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the fundamentals of blockchain architecture 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: categorize cryptography techniques and blocks

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: illustrate the principles consensus algorithms

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: articulate different attacks

Environment &
Sustainability
CLR-5: relate hyper ledger and solidity in applications of block chain

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: comprehend the knowledge on the fundamentals of block chain 3 3 - - - - - - - - - - - - 1
CO-2: interpret the ability to apply models and methods of classical cryptography 2 2 - - - - - - - - - - - 2 -
CO-3: utilize the principles of consensus mechanisms in real time 3 - - - 2 - - - - - - - - - 3
CO-4: categorize the attacks and its impacts 3 3 - - - - - 2 - - - - - - -
CO-5: appraise the block chain principles in real time applications - - 3 - 2 - - - - - - - - - 2

Unit-1 - Introduction- Blockchain Architecture 9 Hour


Backstory of Bitcoin - Blockchain – Distributed Ledger Technology - Centralized vs. Decentralized Systems- Centralized Systems - Decentralized Systems - Layers of Blockchain - Application Layer - Execution
Layer -Semantic Layer - Propagation Layer - Consensus Layer – Importance of Blockchain -Limitations of Centralized Systems
Unit-2 - Blockchain and Cryptography 9 Hour
Peer to Peer Networking – Types of Blockchain: Public Blockchain - Private Blockchain – Consortium Blockchain - Cryptographic Hash Functions – Cryptographic Nonce – Transactions – Merkle Tree - Symmetric,
Asymmetric Key Cryptography - Private Key Storage – Ledgers – Blocks - Chaining Blocks – Blockchain Wallets and its types
Unit-3 - Consensus Mechanism 9 Hour
Proof of Work Consensus Algorithm - Proof of Stake Consensus Algorithm - Delegated Proof of Stake - Round Robin Consensus Algorithm - Proof of Authority/Proof of Identity Consensus Algorithm - Proof of
Elapsed Time Consensus Algorithm – Byzantine Fault Tolerance - Consensus Comparison Matrix, Ledger Conflicts and Resolution.
Unit-4 - Basic Attacks 9 Hour
Attacks - Sybil attack – DDOS – Eclipse Attack – Selfish Mining Attack – Finney attack – Race attack - Wallet Attacks – Zero knowledge proof – Non-interactive Zero Knowledge Proof – Ring Signature - Homomorphic
Encryption
Unit-5 - Decentralized Applications 9 Hour
Ethereum – Smart contracts - Decentralized Applications – Basics: Hyperledger, Fabric, Corda, Solidity, RemixIDE, Ganache, Metamask, Truffle, NodeJS, and Blockchain Testnet. Blockchain in IoT, Cloud computing,
Supply chain management, Healthcare, Automation, Finance. Case Study: Ethereum vs Ethereum classic

362
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Blockchain Consensus: An Introduction to Classical, Blockchain, and Quantum Consensus 3. Dannen, Chris. Introducing Ethereum and solidity. Vol. 1. Berkeley: Apress, 2017.
Protocols, DOI:10.1007/978-1-4842-8179-6,1st edition, Publisher: Apress, ISBN: 978-1- 4. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology, decentralization, and
Learning
4842-8178-9, August 2022. smart contracts explained”, 2nd Edition, Packt Publishing Ltd, March 2018.
Resources
2. Chandramouli Subramanian, “Blockchain Technology”, Universities Press, 2020 5. Pethuru Raj, Kavita Saini, Chellammal Surianarayanan, “Blockchain Technology and
Applications”, CRC Press, 2021.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Kishore Kumar K 1. Dr. K. Suresh, Associate Professor, Department of Information Technology, 1. Ms. S. Srividhya, SRMIST
Senior Technical Consultant (Strategic Accounts) Sri Venkateswara College of Engineering Sriperumbuthur
ManageEngine (A Division of Zoho Corporation

363
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE232T IoT AND BLOCKCHAIN E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic services and concepts of IoT and Blockchain 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate the role of cryptography in Blockchain network

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: acquire knowledge in Networking concept and its part using Blockchain concepts

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: exploring security challenges on Blockchain

Environment &
Sustainability
CLR-5: exploring the tools, platforms, and techniques in Blockchain

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the knowledge of communication in Blockchain 3 2 1 - - - - - - - - - - - 1
CO-2: identify and design different Cryptographical algorithms using Blockchain 3 2 - - 1 - - - - - - - - - 2
CO-3: design the network concepts and implement protocols using Blockchain 3 1 - - - - - - - - - - - - 3
CO-4: identify how Industries adopting Baas for security - 3 2 1 - - - - - - - - - - 2
CO-5: design and implement the various tools and techniques in Blockchain - - 1 3 - - - - - - - - - - 2

Unit-1 - Introduction to IoT and Blockchain 9 Hour


Introduction to Internet of Things (IoT)- Concepts and definitions of IoT-History of IoT –IoT vs Conventional Network-IoT Architecture- Introduction to Blockchain-Generations of Blockchain- Structure of Blockchain-
Opportunities and challenges in IoT and Blockchain - IoT simulators: Tinker cad, Cisco Packet Tracer - Blockchain development frame works: Truffle, Hyperledger fabric
Unit-2 – IoT Security 9 Hour
IoT Layer Challenges – Sensing layer– Challenges in end nodes –Threat based on Network layer- Service layer-based threats-Application Interface layer –Cross layer Challenges-Challenge to implementation of
IoT in Blockchain-IoT Device Integration challenges.
Unit-3 - Consensus Algorithms 9 Hour
Building Blocks of Blockchain-Database-Block-Hash-Minor-Transaction-Smart Contracts-Consensus Mechanisms-PoW-PoS-Characteristics of Blockchain-Types of Blockchain-Permissioned Blockchain-
Permissionless Blockchain-Consortium Blockchain, MetaMask plugin to conduct transactions with Ether, cryptocurrency
Unit-4 - Blockchain as a Service (Baas) 9 Hour
Defining of Blockchain as a Service - IoT Cloud server security challenges– Cloud computing with BaaS-Hybrid Cloud server with BaaS for Remote Monitoring-Case study: Industries adopting BaaS for security.
Unit-5 - Blockchain Use Cases in IoT Sector 9 Hour
Autonomous Decentralized peer to peer telemetry-Blockchain Enabled Security for Smart cities- Blockchain Enabled Smart Home Architecture-Blockchain based self-managed VANETs-Security and privacy of data

364
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Koushik Raj, “Foundation of Blockchain: The pathway to Cryptocurrencies and 3. Nishith Pathathk and Anurag bhandari “IoT, AI, and Blockchain for .NET Building a Next -
Decentralised blockchain applications “, Kindle Edition, 2019. Generation Applkcation from the GroundUp” A Press Publisher.
Learning
2. Daniel Dresher “Blockchain Basics A non-technical Introduction in 25 steps” 2017 A 4. Ovidiu Vermesan, PeterFriess,“Internet of Things: Converging Technologiesfor Smart
Resources
press publishers. Environments and Integrated Ecosystems ”RiverPublishers,2013.
5. Adrian McEwen Hakim Cassimally“DesigningtheInternetofThings”, JohnWiley&Sons, 2014.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Jagadeesh.M.M , Senior DevOps Engineer, 1. Dr.Sudhakar, Associate Professor, 1. Dr.J.Shobana, SRMIST
Ensono Technologies. VIT, ,Andra Pradesh
2. Dr.BalasingamUdayabalan, , Associate Professor, 2. Dr.Ganesh Kumar, SRMIST
East Point College, Bangalore

365
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE233T DISTRIBUTED SYSTEMS AND APPLICATIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: recognize the characterization of distributed systems 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: gather knowledge on remote invocation and indirect communication

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: comprehend the principles distributed objects and components

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: know about the security issues and principles of distributed file systems

Environment &
Sustainability
CLR-5: analyse the distributed transactions

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: recognize the characteristics of distributed systems 2 1 - - - - - - - - - - 2 - 2
CO-2: describe the concepts of remote invocation and indirect communication 2 1 - - - - - - - - - - 2 - 3
CO-3: explain about operating system support and distributed objects, components 2 1 2 - - - - - - - - - 2 - 2
CO-4: recognize the security issues and principles of distributed file systems 2 2 1 - - - - - - - - - 2 - 3
CO-5: describe the distributed transactions mechanism and applications of distributed multimedia systems 2 1 2 - - - - - - - - - 2 2 3

Unit-1 - Characterization of Distributed Systems 9 Hour


Examples of distributed systems, Trends in distributed systems, Focus on resource sharing, Challenges - System Models: Physical models, Architectural models, Fundamental models - Interprocess Communication:
The API for the Internet protocols, External data representation and marshalling.
Unit-2 - Remote Invocation and Indirect Communication 9 Hour
Request-reply protocols, Remote procedure call, Remote method invocation - Indirect Communication: Group communication, Publish-subscribe systems, Message queues
Unit-3 - Operating System Support and Distributed Objects and Components 9 Hour
Operating System Support: The operating system layer, Protection, Processes and threads, Communication and invocation, Operating system architecture, Virtualization at the operating system level - Distributed
Objects and Components: Distributed objects, Case study: CORBA, From objects to components.
Unit-4 - Security and Distributed File Systems 9 Hour
Security: Overview of security techniques, Cryptographic algorithms, Digital signatures, Cryptography pragmatics - Distributed File Systems: File service architecture, Case study: Sun Network File System, Case
study: The Andrew File System.
Unit-5 - Distributed Transactions and Multimedia Systems 9 Hour
Distributed Transactions: Introduction, Flat and nested distributed transactions, Atomic commit protocols, Concurrency control in distributed transactions, Distributed deadlocks, Transaction recovery - Distributed
Multimedia Systems: Characteristics of multimedia data, Quality of service management, Resource management, Stream adaptation - Case studies: Tiger, BitTorrent and End System Multicast.

366
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. George Coulouris, Jean Dollimore, Tim Kindberg and Gordon Blair, Distributed Systems - Concepts 4. Ajay D. Kshemkalyani, Mukesh Singhal, Distributed Computing - Principles,
and Design, Fifth Edition, Addison-Wisely (Pearson Education), 2012. Algorithms, and Systems, Cambridge University Press, 2011.
Learning 2. Andrew S. Tanenbaum and Maarten van Steen, Distributed Systems: Principles and Paradigms, 5. Distributed Systems, IIT Patna (Dr. Rajiv Misra):
Resources Second Edition, Pearson Education, 2017. https://nptel.ac.in/courses/106106168
3. Kenneth P. Birman, Guide to Reliable Distributed Systems - Building High Assurance Applications and 6. Distributed Computing Systems, IIT Madras (Prof. Ananthanarayana V.S):
Cloud-Hosted Services, Springer London, 2014. https://nptel.ac.in/courses/106106107

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. N. Mohanraj, Software Engineer 1. Dr. M. Vinoth Kumar, Associate Professor, Department of Information Science and 1. Dr. M. Prakash, SRMIST
PayPal Inc., Chennai. Engineering, Dayananda Sagar Academy of Technology & Management, Bengaluru.

367
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE234T PRINCIPLES OF CRYPTOGRAPHY E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: recognize the fundamentals of Classical Cryptography 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: articulate Symmetric Cryptography and its methods

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


CLR-3: know the principles Hash Functions and primitives

Modern Tool Usage

Life Long Learning


complex problems
CLR-4: relate Number Theory concepts for cryptography

Problem Analysis

Communication
Environment &
learn Asymmetric Cryptography, Key Management System, Digital Signature Schemes and Public-Key

Sustainability
CLR-5:
Encryption

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the knowledge on the fundamentals of cryptography - 3 - - 3 - - 2 - - - - - - 2
CO-2: describe the models and methods of classical cryptography 3 - - - - - - - - - - - 3 - -
CO-3: utilize the principles of Hash Functions with Crypto system 3 - 2 - 2 - - - - - - - - 2 -
CO-4: apply the knowledge of Number Theory and its applications in cryptography - 2 - - - - - - - - - - - 2 1
CO-5: analyse the ability of Key Management System in real time applications - 3 - - 2 - - - - - - - - 2 -

Unit-1 - Introduction 9 Hour


Security Trends-The OSI Security Architecture, Security Attacks, Security Services and Security Mechanisms, A model for Network Security-Classical Encryption Techniques Modern - Cryptography – Historical
Ciphers – Cryptanalysis - Formal Definitions - Proofs of Security - The One-Time Pad - Limitations of Perfect Secrecy - Shannon‘s Theorem.
Unit-2 - Symmetric Cryptography Algorithm 9 Hour
Symmetric Cryptography Private-Key Encryption- Defining Computationally Secure Encryption, - Constructing Secure Encryption Schemes - Constructing CPA-Secure Encryption Schemes - Modes of Operation -
Chosen-Ciphertext Attacks - Message Authentication Codes - Message Integrity - CBC-MAC - Authenticated Encryption.
Unit-3 - Hash Functions and Symmetric Key Construction 9 Hour
Hash Functions and Application – Definitions - The Merkle–Damgard Transform - Message Authentication Using Hash Functions - Generic Attacks on Hash Functions - The Random-Oracle Model - Hash Functions
– Applications Theoretical Constructions of Symmetric-Key - One-Way Functions - From One-Way Functions to Pseudo randomness - Constructing Pseudorandom Generators - Constructing Pseudorandom
Functions - Assumptions for Private-Key Cryptography.
Unit-4 - Number Theory 9 Hour
Introduction to Divisibility theory and canonical decompositions - Division algorithm - Base - b representations Number patterns - Prime and composite numbers GCD - Euclidean algorithm - Fundamental theorem
of arithmetic LCM - Diophantine equations and congruences - Linear Diophantine equations - Linear Congruence’s - Modular exponentiation - Chinese remainder theorem.
Unit-5 - Asymmetric Algorithms and Digital Signatures 9 Hour
Asymmetric Cryptography- RSA - Cryptographic Assumptions in Cyclic Groups - Algorithms for Factoring and Computing Discrete Logarithms - Key Management - Public-Key Revolution, Encryption and Hybrid
Encryption - RSA Encryption - CDH, DDH-Based Encryption - Digital Signature Schemes - Public-Key Encryption - Trapdoor Permutations - The Paillier Encryption Scheme - Secret Sharing - The Goldwasser –
Micali Encryption Scheme - The Rabin Encryption Scheme.

368
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Introduction to Modern Cryptography (2nd edition) by J. Katz and Y. Lindell. 3. Koshy, T., ―Elementary Number Theory with Applicationsǁ, Elsevier Publications, New Delhi, 2002.
Learning
2. Cryptography Theory and Practice by Douglas Stinson (3rd Edition) by Douglas R 4. Statistical independence in probability, analysis, and number theory By MARK KAC Professor of
Resources
Stinson Cryptography: An Introduction by Nigel Smart Mathematics Cornell University

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Kishore Kumar K, Senior Technical Consultant 1. Dr. K. Suresh, Associate Professor, Department of Information Technology, 1. Ms. S. Srividhya, SRMIST
(Strategic Accounts) ManageEngine (A Division of Sri Venkateswara College of Engineering Sriperumbuthur
Zoho Corporation)

369
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE331T CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: comprehend the basic services and concepts related to crypto currencies 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: analyse the role of cryptography in Blockchain network

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: recognize the services and techniques Ethereum and Cryptocurrency concept in Blockchain

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: know the functions of Cryptocurrency in Blockchain Networks

Environment &
Sustainability
CLR-5: acquire knowledge in Ethereum concept and its part using Blockchain concepts

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the knowledge of cryptocurrency in Blockchain 3 3 1 - - - - - - - - - - - 2
CO-2: identify and design the different Cryptographical algorithms using Blockchain 3 2 1 - - - - - - - - - - - 3
CO-3: design the network concepts and implement protocols using Blockchain 2 2 3 - - - - - - - - - - - 2
CO-4: describe the role of Ethereum and Cryptocurrency using Blockchain 2 2 1 - - - - - - - - - - - 1
CO-5: implement the various AI techniques in Blockchain 2 2 - - 3 - - - - - - - - - 2

Unit-1 - Introduction 9 Hour


Introduction to cryptocurrency - Basics of crypto and cryptocurrencies: - Cryptographic Hash functions - Hash Pointers - Digital Signatures - Digital Signatures – Examples - Public Key as Identities - Mechanics of
Bitcoin: Bitcoin Transactions Bitcoin Scripts - Applications of Bitcoin Scripts - Bitcoin Blocks - Bitcoin Network - Limitations and Improvements - Construction of a Cryptocurrency Portfolio - Understanding Crypto
Trading -Wallets - Public Key -Private Key
Unit-2 - Bitcoin Technology 9 Hour
Bitcoin storage - Hot and Cold Storage - Splitting and Sharing Keys - Online wallets and Exchanges - Payment Services - Simplified Payment Verification (SPV) - Transaction Fees - Currency Exchange Markets -
Managing secret keys of wallet - Hardware wallet - Paper wallet - Bitcoin Mining - Cryptocurrencies as investment option- Example - Analytical framework for crypto investment option - Fundamental Analysis and
Technical analysis - Network Metrics as a price indicator
Unit-3 - Blockchain Technology 9 Hour
Basics of Blockchain Technology - Introduction to Ledgers, Working of financial systems -Difference between block chain with database , History of Block Chain - Characteristics of Block Chain - Distributed Ledger
and Block Chain - Comparison of Distributed Ledger and Block Chain - Types of Block Chain- – Public, Private, Consortium -Blockchain layers – Forks - Double Spending Problem - Byzantine Fault Tolerance
protocol - Voting Protocol - Sybil resistance - Permissioned Consensus - Streamlet: A blockchain protocol - Nakamoto consensus protocol - Mining Incentives – Case Study: Bitcoin vs Bitcoin cash.
Unit-4 - Decentralized Finance (DeFi) 9 Hour
History of Decentralized Finance (DeFi) - DeFi Foundations – Characteristics - Advantages of DeFi - DeFi Primitives: Transaction Mechanisms - Fungible Token - Non-Fungible Token – Example -Supply and
Ownership: Custody – supply Adjustment - incentives Exchanges: Centralized Exchange - decentralized exchange (DEX) - Use cases - Automated Market Makers (AMM) - Uniswap - Collateralized Loan – Flash
Loans - Incentives for Liquidity providers

370
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Cryptocurrency Techniques 9 Hour
Privacy for cryptocurrency: Anonymity - Privacy of Digital Payments - Privacy of Digital Payments – demo - Understanding Ethereum - Privacy in Ethereum - Privacy in Bitcoin - Coin Mixing - Litecoin (LTC) - Altcoins
– Example unidirectional, bi-directional and UTXO - Examples.

1. Koushik Raj, “Foundation of Blockchain: The pathway to Cryptocurrencies and Decentralised 3. Gulshan Shrivastava, Dac-Nhuong Le, Kavita Sharma “Cryptocurrencies and
Learning blockchain applications “, Kindle Edition, 2019. Blockchain Technology Applications” Wiley publishers.
Resources 2. Arvind Narayanan, Joesph Bonnecau, Edward Felten, Andrew Miller, and Steven Goldfeder.” Bitcoin 4. Daniel Dresher “Blockchain Basics A non-technical Introduction in 25 steps” 2017
and cryptocurrency technologies: A comprehensive Introduction” Princeton University Press, 2016. A press publishers.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Imthyaz Serif, Director IDEASSION Technology solutions, Chennai 1. Dr. L. Ramanathan, Associate Professor, VIT Vellore 1. Dr. SV.Shri Bharathi, SRMIST

371
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE332T FUNDAMENTALS OF ETHEREUM E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: recognize the working of Bit coin and Ethereum 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: identify the different components of the Block chain system and interact with them securely

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: design, build and deploy smart contracts and distributed applications

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: analyse the difference between proof-of-work and proof-of-concept

Environment &
Sustainability
CLR-5: assess the need of Enterprise Ethereum Block chain Platforms and Use Cases

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify the design principles of Bit coin and Ethereum 3 1 2 - - - - - - - - - 1 - 3
CO-2: interact with a block chain system by sending and reading transactions 3 - 1 - 1 - - - - - - - - - 2
CO-3: design, build and deploy a distributed application 1 - 2 1 - - - - - - - - - - 2
CO-4: develop Ethereum consensus mechanism 2 - 3 - 1 - - - - - - - - - 3
CO-5: familiarize with Ethereum, smart contracts and related technologies, and solidity language 3 - 2 1 - - - - - - - - - - 3

Unit-1 - Introduction to Ethereum 9 Hour


Ethereum, three parts of block chain, Ether as a Currency and Commodity, Crypto economics, and Security, EVM Architecture, Mist Browser, Wallets as Computing metaphor, Transactions in Ethereum, Encryption-
Asymmetric and Public cryptography, Understanding Denominations, Introduction Solidity
Unit-2 - The EVM and Introduction Solidity 9 Hour
Virtual machine, Ethereum protocols in banking, Applications of EVM, Smart contracts, State changes Gas-Importance, Specifications, opcodes in EVM, Solidity programming, Design rationale, Importance of formal
Proofs Testing, Formatting and Statements, Expressions in solidity
Unit-3 - Evaluating Ethereum and Block Chain 9 Hour
Ethereum for application, Installing Parity, MetaMask, Developing smart contracts, Contract Compilation and deployment , UI Setting, Fund Raiser Application-Overview, creating project, Intialising,setting
beneficiary and custodian, Mappings , Donation Tests, Events, Withdrawing funds ,Fallback Functions
Unit-4 - Mining Ether 9 Hour
Ether Source, Factors for Block validation, Use of ethereum stale blocks, Ethereum and bitcoin trees, Forking, Dapp deployment-contract data models, Meteor with Ethereum, Contracts, Interface, Prototyping,
Creating Private chains, Optional flags, Private block chains,
Unit-5 - Ethereum Application and Crypto Economics 9 Hour
Crypto economics - Rules, Ether Issuance Schemes, Attack scenarios Internet of Ethereum things - Retail and E-commerce, Community and government financing, Human and Organizational behaviour, Financial,
Insurance Applications, Inventory and Accounting, Gaming, gambling and Investing

372
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Introducing Ethereum and Solidity- Chris Dannen, Published: 18 March 2017, Apress Berkeley, CA 4. Mastering Ethereum Building smart contracts and Dapps- Andreas M. Antonopoulos
Learning 2. Hands-On Smart Contract Development with Solidity and Ethereum- Kevin Solorio, Randall Kanna Dr. Gavin Wood, 15 December 2018, , O'Reilly
Resources & David H. Hoover, 25 November 2019, O'Reilly Media 5. The Basics of Bitcoins and Block chains: An Introduction to Crypto currencies and
3. Ethereum For Dummies- Michael G. Solomon,28 March 2019 the Technology that Powers Them – Antony Lewis, September 15, 2018

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. B.Yuvaraj Nandhan, Software Engineer, Bank of America 1. Dr.T.Suresh ,CSE, Annamalai University 1. Dr.R.Jayaraj SRMIST
2. Dr.S.Ganesh Kumar, SRMIST

373
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE333T AI AND BLOCKCHAIN E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
list the basic principles of AI toward problem solving, inference, perception, knowledge representation, Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
and learning
CLR-2: illustrate state core Blockchain concepts, the benefits, and the limitations of blockchain technologies

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


experiment with technical underpinnings of AI and blockchain technology at sufficient depth to perform
CLR-3:

Modern Tool Usage


analysis

Life Long Learning


complex problems
Problem Analysis

Communication
CLR-4: discover the current scope, potential, limitations, and implications of intelligent systems

Environment &
Sustainability
CLR-5: examine real world challenges that blockchain technologies may assist in solving

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: comprehend the basics of artificial intelligence (AI) and its foundations 3 2 1 - - - - - - - - - 2 - -
summarize relevant legal, ethical, and privacy issues and how they might impact policy and actions of
CO-2: 2 3 1 - - - - - - - - - - 2 -
organizations or individuals
build the decisions about the use of blockchain technology in systems, and support decisions with
CO-3: 2 1 3 - - - - - - - - - - - 2
relevant arguments
CO-4: perceive an ability to share in discussions of AI, its current scope and limitations, and societal implications 3 2 - - 2 - - - - - - - - - 2
apply blockchain concepts to analyze examples, proposals, case studies, and preliminary blockchain
CO-5: 2 2 - - 2 - - - - - - - - - 3
system design discussions

Unit-1 - Introduction to AI Landscape 9 Hour


AI – key concepts - History of AI - AI winter - Types of AI : Weak AI&#160, Strong AI ,Super AI- Forms of AI and approaches : Statistical and expert systems, Machine learning, Supervised learning, Unsupervised
learning, Reinforcement learning - Neural networks - Evolutionary computation - Swarm computation - AI in digital transformation: Data extraction - Data transformation - Processing - Storyboarding - Data utilization,
AI platforms and tools : Tensor Flow - Microsoft Cognitive Toolkit - IBM Watson
Unit-2 - Overview of Blockchain 9 Hour
Getting Started with Blockchain: Blockchain versus distributed ledger technology versus distributed databases - Comparing the technologies with examples - Public versus private versus permissioned Blockchain -
Comparing usage scenarios - Privacy in Blockchain - Understanding Bitcoin - A brief overview of Bitcoin, Ethereum: A brief overview of Ethereum, Introduction to Hyperledger - Overview of the project - Hyperledger
Fabric - Hyperledger Saw tooth - Other Hyperledger frameworks and tools
Unit-3 - Blockchain and Artificial Intelligence 9 Hour
Domain Specific Applications - Applying AI & Blockchain: Healthcare, Supply chain, Financial Services, Information Security, Document management, AI & Blockchain Driven Databases - Centralized versus
distributed data, big data for AI analysis, Data Management in a DAO, Emerging patterns for Database Solutions
Unit-4 - AI and Cryptocurrency 9 Hour
Role of AI in Cryptocurrency - Cryptocurrency Trading: Issues & Considerations, Benefits of AI in Crypto Trading - Making Price Predictions with AI: Issues with Price Prediction, Benefits of AI in Prediction, Time
series forecasting with ARIMA, Applications of algorithmic or quant trading in Cryptocurrency

374
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Developing and Future of AI with Blockchains 9 Hour
Applying SDLC practices in Blockchain: Introduction to DIApp - Architecture of a DIApp - Developing a DIApp - Testing a DIApp - Deploying DIApp - Monitoring a DIApp, Implementing DIApp - Evolution of
decentralized applications, building a sample DIApp, Developing Smart Contracts, Solution approach with AI, Developing: Client code, Backend, Frontend, Future of converging AI & Blockchain in enterprises &
Government.

1. Kumble, G. P. (2020). Practical Artificial Intelligence and Blockchain: A guide to converging 3. Nishith Pathak, Anurag Bhandari .(2018).IoT,AI and Blockchain for .NET
Learning blockchain and AI to build smart applications for new economies. Packt Publishing Ltd 4. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, And Steven Goldfeder
Resources 2. Smith, S. S. (2019). Blockchain, artificial intelligence and financial services: Implications (2016). BITCOIN AND CRYPTOCURRENCY TECHNOLOGIES4
and applications for finance and accounting professionals. Springer Nature 5. Vikram Dhillon, David Metcalf, Max Hooper (2017).Blockchain Enabled Applications

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. S.Gomathi Sankar , Technical Lead .LTIMindtree 1. Dr.Soma Prathibha , Sri Sai Ram Enginering College,Chennai 1. Dr.A.Siva Kumar SRMIST
2. Dhilip Velumani, Module Lead,LTIMindtree 2. Dr.S.V.N Santhosh Kumar , VIT Vellore 2. Dr.S.Ganesh Kumar SRMIST

375
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE334T CONTAINER MANAGEMENT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: comprehend fundamentals of cloud application development 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: deployment of Cloud Applications using Cloud Native Services

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: design various Cloud Applications

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the Cloud Security and Cloud pricing models

Environment &
Sustainability
CLR-5: learn the purpose of stream processing and its basic components

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: comprehend Cloud fundamental Concepts 2 1 - - 1 - - - - - - - 1 - -
understand virtualization foundations to cater the needs of elasticity, portability, and resilience by cloud
CO-2: - 2 - - 2 - - - - - - - - 2 -
service providers
CO-3: compare operation and economic models of various trending cloud platforms prevailing in IT industry - 3 - - 3 - - - - - - - - - 2
CO-4: learn why automation, culture, and metrics are essential to a successful DevOps 2 3 - - 3 - - - - - - - - - 3
CO-5: design a cloud framework with appropriate resource management techniques with its security - 2 3 - 2 - - - - - - - 2 - -

Unit-1 - Introduction Cloud Computing 9 Hour


Introduction-- Cloud Introduction –NIST Definition: Cloud service Models - IaaS/ PaaS / SaaS, Deployment Models –Public, Private, Hybrid and Community, Cloud Characteristics, Cloud Challenges –user, Service
Provider end, Applications of Cloud, Cloud federation, Cloud Enabling Technology, - Challenges and Issues-
Unit-2 - Virtualization 9 Hour
Introduction to Hypervisors – Type 1 Hypervisors – Type 2 Hypervisors –. Basics of Virtualization - Types of Virtualizations - Understanding Hypervisors - Implementation Levels of Virtualization -Virtualization
Structures - Tools and Mechanisms – Resource sharing and Resource pooling -Desktop Virtualization – Server Virtualization.
Unit-3 - Containerization Using Dockers 9 Hour
Docker, Containers, Usage of containers, Terminology, Docker Run Static sites, Docker Images, Docker File, Docker on AWS, Docker Network, Docker Compose, Development Workflow, and AWS EC Services.
Unit-4 - Devops 9 Hour
Introduction, Test Driven Development, Continuous Integration, Code coverage, Best Practices, Virtual Machines vs Containers, Rolling Deployments, Continuous Deployment, Auto Scaling. Case Study: Open
Stack, Cloud based ML Solutions in Healthcare
Unit-5 - Cloud Security 9 Hour
Cloud Application Development – Cloud Application Execution, Applications using Containers - Testing the Cloud Application, Case study on Cloud Application – Cloud Security Concepts - Cloud Security Threats,
Cloud Security Mechanisms: Encryption, Public Key Infrastructure, Identity and Access Management, Single Sign-On: Kerberos authentication, Mobile Cloud, Green Cloud.

376
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Rajkumar Buyya, James Broberg, Andrzej, M. Goscinski, Cloud Computing: Principles and 5. Buyya, Rajkumar, Christian Vecchiola, and S. Thamarai Selvi. Mastering Cloud Computing:
Paradigms, Wiley, 1st Edition, 2013. Foundations and Applications Programming, Tata Mcgraw Hill, 1 st Edition, 2017.
2. Sosinsk, Barrie, Cloud Computing Bible, John Wiley & Sons, 1 st Edition, 2011. 6. Ellis B, Real-Time Analytics – Techniques to analyze and visualize streaming data, 1st ed.,
Learning 3. Docker: Up & Running: Shipping Reliable Containers in Production”, Sean P. Kane, Karl John Wiley & Sons Inc,2014
Resources Matthias, O’Reilly Media Inc, 2015. 7. Mark Wilkins, “Learning Amazon Web Services (AWS): A Hands-On Guide to the
4. Thomas Erl, ZaighamMahmood, RichardoPuttini, "Cloud Computing: Concepts, Technology Fundamentals of AWS Cloud”, 2019.
and Architecture", Fourth Printing, 2014, Prentice Hall/PearsonPTR, ISBN: 9780133387520. 8. https://cloudacademy.com/course/introduction-to-devops/intro-3/

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Rajarajan Sundaramurthy, Zealogics systems, 1. Dr. K. Pradeep, Assistant Professor, 1. .Dr.N.Manikandan, SRMIST
Kakkanad, Kerala School of Computer Science and Engineering, VIT Chennai.

377
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE335T ADVANCED CRYPTOGRAPHY E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: comprehend the fundamental knowledge of the cryptographical technologies 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: remember the mathematics behind Cryptography

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: analyze the design of various cryptographic primitives

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: apply the process of implementing the cryptographic algorithms

Environment &
Sustainability
CLR-5: evaluate the foundations of modern cryptography toward practical applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: comprehend the principles of cryptography - 3 2 1 - - - - - - - - 1 3 2
CO-2: realize the current rigorous approaches for evaluating the security of cryptographic constructions - 3 3 1 - - - - - - - - 1 - 3
CO-3: analyze cryptographic schemes - 3 2 2 - - - - - - - - 2 3 2
CO-4: describe core concepts and terminology concerning use of cryptography - 3 2 1 - - - - - - - - - - 2
CO-5: explain the concepts of encryption and authentication - 1 2 1 - - - - - - - - - - 3

Unit-1 - Introduction to Cryptography 9 Hour


Classic ciphers—Substitution techniques- Transposition Techniques-Stream Cipher-Properties of Stream Cipher - Model of a stream cipher -Block Cipher- Properties of Block Cipher- Model of a Block cipher
Unit-2 - Symmetric Key Ciphers 9 Hour
Block Cipher principles- Data Encryption Standard (DES) - Triple 3DES - Advanced Encryption Standard (AES)- RC4- RC5-Blowfish
Unit-3 - Asymmetric Key Ciphers 9 Hour
Principles of public key cryptography- Integer Factorization Schemes: Rivest-Shamir-Adleman (RSA)- Discrete Logarithm Schemes: Digital Signature Algorithm (DSA)- ElGamal- Elliptic Curve Cryptography (ECC)-
Other public key algorithms. Cryptographic Protocols-Diffie-Hellman Key Agreement Protocols - Fiat-Shamir Identification Scheme
Unit-4 - Message Integrity and Hash Function 9 Hour
Message Authentication Code (MAC)- CBC-MAC – HMAC- DAA-CMAC. Hash Function: Secure Hash Algorithm (SHA)-SHA1-SHA2-SHA3-Message digest-MD4-MD5
Unit-5 - Cryptographic Applications 9 Hour
Securing the internet- Wireless local area networks- mobile telecommunications-Secure payment card transactions-video broadcasting-identity cards-anonymity-digital currency. The Future of Cryptography- quantum
computing- postquantum cryptography- quantum cryptography

1. An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its 4. Cryptography Engineering: Design Principles and Practical Applications, Niels Ferguson,
Applications), Richard A. Mollin, Taylor & Francis, 2006 Bruce Schneier, and Tadayoshi Kohno, John Wiley & Sons Inc; 1st edition ,2010
Learning
2. Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C, Bruce 5. Cryptography and Network security Principles and practice, William Stallings Seventh
Resources
Schneier, John Wiley & Sons, Inc, 1996 edition, Pearson, 2017
3. Cryptography: An Introduction (3rd Edition) Nigel Smart, Mcgraw-Hill College,2003
378
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.V. Gopinath, Solution Architect, Tata Consultancy 1. Dr. M. Sugumaran, Professor, Department of Computer Science and 1. Dr. Panimalar.K, SRMIST
Service Ltd., Chennai Engineering, Puducherry Technological University, Puducherry

379
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE336T CLOUD COMPUTING WITH BLOCKCHAIN E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: comprehend the fundamentals of cloud computing and blockchain 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: recognize the protection of cloud resources

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: know about blockchain as a service

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: gain knowledge in cloud data management and smart contracts

Environment &
Sustainability
CLR-5: identify the uses of cloud computing and blockchain technology in the industry

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: recognize the concepts of cloud computing and blockchain 1 1 - - - - - - - - - - 1 - 3
CO-2: describe the Features of cloud computing and implementation of mart contracts 1 2 3 - - - - - - - - - 1 - 3
CO-3: identity various blockchain business models and its applications 1 - 2 - - - - - - - - - 1 - 3
CO-4: explain the cloud data management and implement the integrated services using smart contracts 1 2 3 - - - - - - - - - 1 - 3
CO-5: explain the uses of cloud and blockchain technology in the industry 1 - 2 - - - - - - - - - 1 - 3

Unit-1 - Fundamentals of Cloud Computing and Blockchain 9 Hour


Cloud Computing: Concepts, features, Cloud computing delivery services and network operations, Cloud deployment models, Models benefits and challenges – Blockchain: Concepts, features - Introduction to
cryptocurrencies and blockchain-based solutions, Configuration of blockchain network.
Unit-2 - Cloud Resources and Smart Contracts 9 Hour
Features of cloud computing providers, provisioning of cloud computing, storage and networking resources, implementation of cloud-based solutions, Smart contracts functions and its uses, design, and
implementation of smart contracts.
Unit-3 - Blockchain as a Service 9 Hour
Blockchain Business Models, Traditional business models-Types of Blockchain Business Models- Blockchain as A Service (BaaS)-Token Economy- Utility Token Business Model-Blockchain-Based Software
Products, P2P Blockchain Business Model-Blockchain Professional Services. Block chain for Banking and Financial transactions, The development of portable, scalable, and extensible cloud resources applications
(AWS).
Unit-4 - Cloud Data Management and Integrated Services Using Smart Contracts 9 Hour
Cloud data protection. Data modernization, databases, and file storage cloud solutions, implement strategies for backup and data recovery, Blockchain offline storage, IPFS, Analyse, design, and implement
distributed applications (DApps).
Unit-5 - Cloud Computing and Blockchain Technology in the Industry 9 Hour
Cloud development operations (DevOps) services, to propose a solution that integrates cloud services and blockchain technology to design and implement a hybrid architecture, Blockchain as a Service - Cloud
server security challenges - Cloud computing with BaaS-Hybrid Cloud server with BaaS for Remote Monitoring-Case study: Industries adopting BaaS for security.

380
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Jai Singh Arun, Jerry Cuomo, Nitin Gaur, Blockchain for Business - For Understanding 4. John W. Rittinghouse, James F. Ransome, Cloud Computing - Implementation,
transformation, growth and new models of Business, First Edition, Pearson, 2019. Management, and Security, CRC Press, 2017.
Learning 2. Judith S. Hurwitz, Robin Bloor, Marcia Kaufman, Fern Halper, Cloud Computing for 5. Blockchain Architecture Design and Use Cases, IIT Kharagpur, Sandip Chakraborty,
Resources Dummies, Wiley, 2010. Praveen Jayachandran: https://nptel.ac.in/courses/106105184
3. Andrzej M. Goscinski, James Broberg, Rajkumar Buyya, Cloud Computing Principles and 6. Introduction to Blockchain Technology and Applications, IIT Kanpur Prof. Sandeep Shukla:
Paradigms, Wiley, 2010. https://nptel.ac.in/courses/106104220

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. N. Mohanraj, Software Engineer 1. Dr. M. Vinoth Kumar, Associate Professor, Department of Information Science and 1. Dr. M. Prakash, SRMIST
PayPal Inc., Chennai. Engineering, Dayananda Sagar Academy of Technology & Management, Bengaluru.

381
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE337T WEB3 DEVELOPMENT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: comprehend the basics of web technologies, XHTML, and HTML5 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: explore CSS, and JavaScript

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: explore event handling techniques and Java Servlet

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: acquire knowledge on XML, AJAX, and JSP

Environment &
Sustainability
CLR-5: develop web services, working with Python, databases, anyone DB Connectivity, MongoDB, ReactJs

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the knowledge of web essentials, XHTML, and HTML5 3 - 2 - - - - - - - - - 3 - -
CO-2: apply CSS Styling, and interactive web design techniques while creating a web page 3 - 2 - 1 - - - - - - - - 2 -
CO-3: implement and analyze event handling techniques and Java Servlet for web application development 3 1 3 - - - - - - - - - - - 1
CO-4: create XML document, apply AJAX, and JSP for developing a web application 2 1 3 - - - - - - - - - - 3 -
develop web services, apply the basic knowledge of Python, database, anyone DB Connectivity,
CO-5: 1 - 3 - 3 - - - - - - - 1 - -
MongoDB, and NodeJs

Unit-1 - Web Essentials 9 Hour


Clients, Servers, Communication, The Internet-Basic Internet Protocols -The World Wide Web, Comparison web1.0, Web2.0 and web3.0 and its tool, HTTP request message, Response Message, Web Clients,
Web Servers, XHTML. An Introduction to HTML History, Versions, XHTML Syntax and Semantics, Fundamental HTML Elements, Relative URLs-Lists-tables-Div-Frames-Forms, HTML5 : Responsive web design,
developing a web page using URLs, imgs, and Lists, developing a web page using HTML tables, divs/frames, creating a HTML Form for maintaining course details.
Unit-2 - Cascading Style Sheets 9 Hour
Introduction to Cascading Style Sheets- Features-Core, Syntax-Style Sheets and HTML Style, Cascading, Inheritance, Text Properties, Box Model Normal Flow Box Layout, Beyond the Normal Flow, Client- Side
Programming, The JavaScript Language, JavaScript in Perspective-Syntax Variables, Implementation of CSS Inheritance, Implementation of Text properties, Implementation of Box model to display distinct
paragraphs in three different boxes, Applying JavaScript to create an interactive web page for performing arithmetic calculations.
Unit-3 - Event Handling 9 Hour
Host Objects, Browsers and the DOM-Introduction to the Document Object Model, DOM History and Levels, Event Handling—Accommodating Noncompliant Browsers, Java Servlet- Architecture, Overview-A
Servlet, Generating Dynamic Content, Life Cycle- Parameter Data, Sessions and Cookies, URL Rewriting-Other Capabilities, Data Storage Servlet and Concurrency.
Unit-4 - XML, AJAX, XSLT, and JSP 9 Hour
XML REPRESENTATION, Representing Web Data, XML-Documents and Vocabularies, Versions and Declaration, Namespaces JavaScript and XML, Ajax-Event Oriented Parsing, SAX-Transforming XML
Documents, XPATH-Template based Transformation, XML Schema-Communicating Object Data, XSLT-Displaying XML Documents in Browsers, JSP Technology Introduction-JSP and Servlet, Running JSP
Applications, JavaBeans Classes and JSP Tag Libraries. Applying XML & XSLT to display product information.

382
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Web Services, and Advanced Concepts in Web Development 9 Hour
JAX-RPC-Concepts, writing a Java Web Service, consuming a RESTfull Web Service, WSDL- Representing Data Types, SOAP Related Technologies, Software Installation, Working with Python, Basic concepts in
Databases, DB Connectivity, working with MongoDB, Working with ReactJs.

1. Deitel , Deitel and Nieto, “Internet and World Wide Web – How to program”,4th Edition, Pearson 6. Marty Hall and Larry Brown, ”Core web Programming ”, Pearson education, 2001
Education Publishers, 2009 7. Jobinesh Purushothaman, “RESTful Java Web Services” Second Edition, Packt
2. Jeffrey C Jackson “Web Technologies” , Pearson Education,2006 Publishing, 2015
Learning
3. Eric Freeman, Elisabeth Robson, “HTML5 Programming”, first edition, O’Reilly Publishers, 2011. 8. https://www.computer-pdf.com/web-programming/javascript/851-tutorial-react-js-
Resources
4. Robert. W.Sebesta, ”Programming the world wide web”, Fourth Edition, Pearson Education, 2007 notes-for-professionals-book.html
5. Bates “Developing Web Applications”, Wiley 2006 9. https://www.tutorialspoint.com/mongodb/mongodb_tutorial.pdf
10. https://www.stat.berkeley.edu/~spector/python.pdf

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Hari hara sudhan M, Tech Lead, Infosys Ltd. 1. Dr. A. Tamizhselvi, Associate Professor, SJCE 1. Dr. K. Dhanasekaran, SRMIST
2. Irrai anbu Jayaraj, Business analyst, CSL pvt ltd 2. Dr. S. Kannimuthu, Professor and Head, AI & DS, KCE

383
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE338T TRUST BASED COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: gain knowledge about fundamental technologies behind Trusted Computing 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
comprehend trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-

Design/development of solutions
CLR-2:
depth technical level and in an enterprise context

Environment & Sustainability


learn about how other technologies such as the Dynamic Root of Trust for Measurement (DRTM) and

The engineer and society


CLR-3:

Conduct investigations of

Individual & Team Work


Engineering Knowledge
virtualization can both take advantage of TPMs and be used to enhance the TPM's capabilities

Project Mgt. & Finance


apply for use cases related to trusted computing, including machine authentication, data protection, and

Modern Tool Usage


CLR-4:

Life Long Learning


complex problems
Problem Analysis
attestation

Communication
study various software resources that exist today to support TPMs, give a high-level overview of related
CLR-5:
research and development projects

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: realize the concept of Trust, Security and Game theory 3 3 - 1 - - - - - - - - - - 1
CO-2: obtain general understanding of trust and alternative operations 3 3 - 2 - - - - - - - - - - 2
CO-3: learn about the importance of systems and cryptographic hash functions 3 2 - 2 - - - - - - - - - - 3
CO-4: learn about bitcoin, blockchain and trust lifecycle 3 2 - - - - - - - - - - 1 - -
CO-5: analyze risk, trust and control using case studies 2 3 - - - - - - - - - - 2 - 2

Unit-1 – Introduction to Trust 9 Hour


Analysing Our Trust Statements - Agency - Trust and Security - Trust as a Way for Humans to Manage Risk - Risk, Trust, and Computing - Defining Correctness in System Behaviour - The Role of Monitoring and
Reporting in Creating Trust - Game theory - The Prisoner’s Dilemma - Reputation and Generalised Trust - Institutional Trust
Unit-2 – Trust Operations and Alternatives 9 Hour
Trust Actors, Operations, and Components - Reputation, Transitive Trust, and Distributed Trust - Agency and Intentionality - Alternatives to Trust - Legal Contracts - Enforcement - Verification - Assurance and
Accountability - Trust of Non-Human or Non-Adult Actors - Expressions of Trust - Relating Trust and Security - Misplaced Trust
Unit-3 – Importance of Systems 9 Hour
System Design - The Network Stack - Linux Layers - Virtualisation and Containers: Cloud Stacks - Other Axes of System Design - “Trusted” Systems - Trust Within the Network Stack - Trust in Linux Layers - Trust
in Cloud Stacks - Hardware Root of Trust - Cryptographic Hash Functions - Measured Boot and Trusted Boot - Certificate Authorities - Internet Certificate Authorities - Local Certificate Authorities - Root
Certificates as Trust Pivots
Unit-4 – Block Chain and Trust 9 Hour
Bitcoin and Other Blockchains - Permissioned Blockchains - Trust without Blockchains - Blockchain Promoting Trust - Permissionless Blockchains and Cryptocurrencies - The Importance of Time - Decay of Trust
and Lifecycle - Software Lifecycle - Trust Anchors, Trust Pivots, and the Supply Chain - Direct trust and indirect trust.

384
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 – Case Studies and Applications 9 Hour
Analysis of risk, trust, and control in cloud computing - Trust in Computational Intelligence Systems - Individual Trust Development in Computer Mediated Collaboration Teams - Development of Trust in a Business
Relation - supply chain use case – banking use case– mini projects.

1. Trust in Computer Systems and the Cloud, Mike Bursell, ISBN: 978-1-119-69232-4, 4. Data Privacy and Trust in Cloud Computing, Building trust in the cloud through assurance and
Wiley, Dec 2021. accountability, Edited byTheo Lynn · John G. Mooney Lisa van der Werff · Grace Fox,
Learning 2. Trusted Computing, by by Dengguo Feng, Tsinghua University Tsinghua University Palgrave macmillian, ISBN 978-3-030-54660-1, 2021.
Resources Press, December 2017, Publisher: De Gruyter, ISBN: 9783110476095. 5. Trusted Computing Platforms: TCPA Technology in Context, by Siani Pearson, Boris
3. A Practical Guide to Trusted Computing, by David Challener, Kent Yoder, Ryan Balacheff, Prentice Hall Professional, 2003
Catherman, David Safford, Leendert Van Doorn, IBM Press, 27 December 2007.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Ishan Roy, Director, Metabasu Technologies Private Limited 1. Dr.S. Ganapathy, Associate Professor, Vellore Institute of Technology, Chennai. 1. Dr. Prabhu kavin.B, SRMIST
2. Mr. Rex Aantonny, Founder & CEO, Rex Cyber Solutions Pvt Ltd 2. Dr. S. Muthurajkumar, Assistant Professor / Computer Technology, Madras Institute of
Technology Campus, Anna University, Chrompet, Chennai - 600044.

385
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE431T BUILDING PRIVATE BLOCKCHAIN E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: comprehend the basics of distributed database and cryptography 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: integrate ideas from Blockchain Technology

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: design, build and deploy smart contracts and distributed applications

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: know the Cloud Security and Cloud pricing models

Environment &
Sustainability
CLR-5: learn the purpose of stream processing and its basic components

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: explain the basic concepts of Database systems - 1 - - 1 - - - - - - - - 2 -
CO-2: explore the design principles of Bitcoin and Ethereum - 2 - - 2 - - - - - - - 1 - 2
CO-3: describe emerging abstract models for Blockchain Technology - 3 2 - 3 - - - - - - - 1 - 3
CO-4: implement Hyperledger Fabric and Ethereum platform to Block chain Application - 3 2 - 3 - - - - - - - - - 3
CO-5: design, build, and deploy a distributed application - 2 - - 2 - - - - - - - 1 - 2

Unit-1 - Introduction 9 Hour


Distributed Database – Hadoop Distributed File System – Distributed Hash Table – ASIC resistance – Cryptography: Hash function – Digital signature – Memory Hard Algorithm
Unit-2 - Blockchain 9 Hour
Introduction to Blockchain – Advantage over conventional distributed database – Blockchain Network – Mining Mechanism – Distributed Consensus – Merkle Patricia Tree – Gas Limit – Transactions and Fee –
Anonymity – Reward – Chain Policy – Life of Blockchain application – Soft & Hard Fork – Private and Public blockchain
Unit-3 - Distributed Consensus 9 Hour
Nakamoto consensus – Proof of Work – Proof of Stake – Proof of Burn – Difficulty Level – Sybil – Attack – Energy utilization and alternate.
Unit-4 - Cryptocurrency 9 Hour
History – Distributed Ledger – Bitcoin – Bitcoin protocols – Mining strategy and rewards – Ethereum – Construction – DAO – Smart Contract – GHOST – Vulnerability – Attacks – Sidechain – Namecoin.
Unit-5 - Cloud Security 9 Hour
Internet of Things – Medical Record Management – Application of Blockchain in Government – Blockchain use cases – Finance.

1. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller and Steven Goldfeder, Bitcoin and 5. Albert Szmigielski, Bitcoin Essentials, 2016
Cryptocurrency Technologies: A Comprehensive Introduction, Princeton University Press, 2016. 6. Daniel Forrester , Mark Solomon, Bitcoin Exposed:Today's Complete Guide to
Learning 2. Xu, Xiwei, Weber, Ingo, Staples, Mark, Architecture for Blockchain Applications, Springer, 2019. Tomorrow's Currency
Resources 3. Andreas M. Antonopoulos, “Mastering Bitcoin: Programming the Open Blockchain”, Second Edition, 7. Antony Lewis,The Basics of Bitcoins and Blockchains An Introduction to
O’Reilly, 2017 Cryptocurrencies and the Technology that Powers Them ,2018
4. Pradip Dey, Manas Gosh, “Programming in C”, First Edition, Oxford University Press, 2018
386
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Rajarajan Zelogic Systems 1. Dr.K.Pradeep, VIT 1. Dr.N.Manikandan, SRMIST

387
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE432T BLOCKCHAIN TECHNOLOGY WITH HYPERLEDGER E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: realize the block chain in industry perspective 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: apply the concepts of hyperledger fabric component designs

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: apply the hyperledger trade network concepts in business networks

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: apply the concepts of smart contract transactions and ledger data structures

Environment &
Sustainability
CLR-5: develop smart contracts for any use case

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: comprehend the enterprise block chain and the basic of hyperledger fabric 3 3 1 - - - - - - - - - - - 3
CO-2: apply the concepts of hyperledger fabric component designs 3 3 1 - - - - - - - - - - - 2
CO-3: apply the hyperledger trade network concepts in business networks 3 3 2 - 3 - - - - - - - - 2 -
CO-4: apply the concepts of smart contract transactions and ledger data structures 3 3 2 - 3 - - - - - - - - - 2
CO-5: build smart contracts for real time use cases - - 2 - 3 - - - - - - - - - 3

Unit-1 - Blockchain – An Enterprise and Industry Perspective 9 Hour


Blockchain in the enterprise - Good fit applications - Enterprise blockchain business evaluation considerations - Enterprise view blockchain - Integrating a blockchain infrastructure for the whole enterprise - Enterprise
design principles - Business considerations for choosing a blockchain framework - Exploring Hyperledger Fabric - Building on the foundations of open computing - Fundamentals of the Hyperledger project -
Hyperledger frameworks, tools, and building blocks
Unit-2 - Transactions and Business Networks 9 Hour
Hyperledger Fabric component design - Hyperledger Fabric – the journey of a sample transaction - Actors and components in a Hyperledger Fabric network - CAP theorem - new features - Business Networks - A
busy world of purposeful activity - Language for business networks - Defining a business network - Participants - Assets - Transactions – Events - Business network technology
Unit-3 - Setting the Stage with a Business Scenario 9 Hour
Trading and letters of credit - Business scenario and use case - Designing and configuring a Hyperledger Fabric trade network - Launching a sample trade network - Configuring our development environment for
network operations
Unit-4 - Designing Smart Contract Transactions and Ledger Data Structures 9 Hour
Architecture of the trade solution - Starting the contract development - Creating a contract - Access control - Implementing contract functions - Testing a contract - Advanced contract designs - Transaction mechanisms
- Logging output
Unit-5 - Developing Smart Contracts and Use Cases 9 Hour
Developing Smart Contracts - Use case 1: Blockchain in trade/supply chain: (i) Provenance of goods, visibility, trade/supply chain finance, invoice management discounting, etc., - Use case 2: Blockchain for
Government: (i) Digital identity, land records and other kinds of record keeping between government entities, (ii) public distribution system social welfare systems Blockchain Cryptography, Privacy and Security on
Blockchain Practical Component Building a Network and Deploying Smart Contract & Security

388
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Blockchain with Hperledger Fabric - Second Edition- Nitin Gaur, Anthony O'Dowd, Petr 4. Blockchain for Business with Hyperledger Fabric (English, Undefined, Shah Nakul)
Novotny, Luc Desrosiers, Salman A. Baset, November 2020, Packt, ISBN 9781839218750 5. Hyperledger Cookbook: Over 40 recipes implementing the latest Hyperledger blockchain
Learning 2. Hyperledger Fabric In-Depth: Learn, Build and Deploy Blockchain Applications Using frameworks and tools Paperback – Import, 30 April 2019 by Xun (Brian) Wu, Chuanfeng
Resources Hyperledger Fabric, 1st Edition, Ashwani Kumar Zhang, Andrew Zhang
3. Hands-On Smart Contract Development with Hyperledger Fabric V2: Building Enterprise 6. https://hyperledger-fabric.readthedocs.io/en/latest/tutorials.html
Blockchain Applications, Matt Zand

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Divya, Member Technical staff- Senior Developer, ZOHO 1. Dr.S.P. Siddique Ibrahim, Assistant Professor, VIT-AP University. 1. Dr G. Elangovan, SRMIST

389
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE433T BLOCKCHAIN BUSINESS MODELS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the basics of Blockchain and apply cryptography algorithms 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: learn the consensus methods for an application

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: use blockchain for business models

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: apply data structures for blockchain

Environment &
Sustainability
CLR-5: understand how to develop blockchain business models

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: discuss the basics of Blockchain business models 3 3 - - - - - - - 1 - - - - 3
CO-2: apply the cryptography techniques in blockchain 3 3 - - - - - - - 2 - - - - 3
CO-3: identify the appropriate consensus methods for application 3 3 - - - - - - - - - - - - -
CO-4: describe the technology stack for Blockchain 3 3 - 1 - - - - - - - - 2 - -
CO-5: apply the blockchain for business models 3 3 - 3 - - - - - - - - 1 - -

Unit-1 – Introduction to Blockchain Technologies 9 Hour


History of Blockchain-Terminologies in Blockchain-Types of Blockchain-Applications of Blockchain- How blockchain works-Ingredients of Blockchain. Case Study: Create Survey report of various types of Blockchain
and its real time use cases
Unit-2 - Cryptography 9 Hour
Introduction to cryptography-Encryption and Decryption-Ciphers-Cryptography using arithmetic modulo primes-hashing algorithms-SHA-256 algorithm-Application of SHA algorithm. Case Study: Implement program
to convert given text into hashes using SHA 256 algorithm.
Unit-3 – Consensus Mechanisms 9 Hour
Introduction to Consensus Methods-Proof of Work (PoW)-Proof of Stake (PoS)-Proof of Burn (PoB)- Proof of Activity (PoA)-Proof of Elapsed Time (PoET)-Simplified Byzantine fault Tolerance-Mining. Case Study:
Prepare comparison study report of various Consensus methods for financial transaction.
Unit-4 – Data Structure of Blockchain 9 Hour
Data structures for Blockchain-Merkle Trees-Shared data- Protocols—Fat Protocols-Platforms- DAPPS-Smart Contracts. Case Study: Create simple smart contract for User identity management using Solidity
language.
Unit-5 – Blockchain Business Models 9 Hour
Introduction to Blockchain Business Models-Need for Blockchain business models- Traditional business models-Types of Blockchain Business Models- Blockchain as A Service (BaaS)-Token Economy- Utility Token
Business Model-Blockchain-Based Software Products- P2P Blockchain Business Model-Blockchain Professional Services. Block chain for Banking and Financial transactions. Case Study: Create simple wallet
transaction from one account to another account using Metamask.

390
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Blockchain for Business, 1st edition, Published by Addison-Wesley Professional 4. The Internet of Money: A collection of talks by Andreas M. Antonopoulos, November 2019.
(May 9th 2019) - Jai Singh Arun, Jerry Cuomo, Nitin Gaur. 5. The Blockchain Developer - A Practical Guide for Designing, Implementing, Publishing,
Learning 2. Blockchain Business Models, A Complete Guide, Gerardus Blokdyk, March 2021. Testing, and Securing Distributed Blockchain-based Projects, by Elad Elrom, Apress, July
Resources 3. Blockchain Development for Finance Projects, by Ishan Roy, January 2020, Packt 2019, ISBN:9781484248478.
Publishing, ISBN: 9781838829094 6. The Metaverse: And How It Will Revolutionize Everything, Book by Matthew Ball, July
2022.Publisher : Liveright

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Ishan Roy, Director, Metabasu Technologies Private Limited 1. Dr.S. Ganapathy, Associate Professor, Vellore Institute of Technology, Chennai. 1. Dr. Prabhu kavin.B, SRMIST
2. Mr. Rex Aantonny, Founder & CEO, Rex Cyber Solutions Pvt Ltd 2. Dr. S. Muthurajkumar, Assistant Professor / Computer Technology, Madras
Institute of Technology Campus, Anna University, Chrompet, Chennai - 600044.

391
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE434T DISTRIBUTED LEDGER TECHNOLOGY E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understanding the fundamentals & basic tools used for DLT regulatory framework 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: employ knowledge in Hyperledger Fabric and Cryptographic Approaches for Hyperledger

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: demonstrate the services and techniques in Smart Contracts and Communication Technologies

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: implement and analyze the different Leading Blockchain and DLT Protocols

Environment &
Sustainability
CLR-5: categorize the different Case studies related to DLT

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: recognize the knowledge of Distributed ledger technology 3 2 - - - - - - - - - - 2 - 2
CO-2: design and illustrate the Hyper ledger Fabric and cryptographic approaches 3 2 - - - - - - - - - - 2 - 2
CO-3: analyze the characteristics of End-to-End Encryption in Hyper ledger 3 3 - - - - - - - - - - 2 - 2
CO-4: choose the DLT protocols & deploying smart contracts on block chain 3 3 - - 2 - - - - - - - 2 - 3
CO-5: manipulate Block chain applications with Hyper ledger applications 3 3 - - 2 - - - - - - - 2 - 3

Unit-1 – Fundamentals of DLT 9 Hour


Introduction to Distributed ledger technology, DLT designs and its types, Key features of DLT, Blockchain – DAG, Hash Graph, Holo Chain – Tempo (Radix), Permission less Distributed Ledgers vs. Permissioned
Distributed Ledgers, Advantages of DLT, Challenges Related to DLT, Risks Related to DLT.
Unit-2 - Hyperledgers Fabric and Cryptographic Approaches 9 Hour
Hyperledgers Fabric and Cryptographic Approaches for Hyperledger, Hyperledger Fabric - Architecture, Functionalities, Hyperledger Fabric Model, Hyperledger Fabric Network, Identity, Security-hole in Hyperledger,
End-to-End Encryption in Hyperledger, Hash functions, Digital Signatures.
Unit-3 - Smart Contracts and Communication Technologies 9 Hour
Introduction to Smart Contracts, Ledger Development-Endorsement, Valid transactions, Channels, Intercommunication, System chain code, Networking protocol, Various communication frameworks, Communication
in IoT, Smart contract templates
Unit-4 – DLT Protocols, Architecture and Testing 9 Hour
Leading Blockchain and DLT Protocols, Quorum - Ripple, MultiChain, Symbiont, OpenChain, Cardano, IOTA, EOS - HashGraph, Corda Architecture, Installation - Development, Deployment Unit, and Functional
Testing.
Unit-5 – DLT Case Studies and Applications 9 Hour
DLT Case Study, Blockchain applications with Hyperledger applications, Agriculture, Healthcare and the Life Sciences, Financial Sector and Banking, Digital Identity, Media and Entertainment, Supply Chain, Law,
Government and Real estate, Telecom domain, Healthcare—Corda and Ethereum Hybrid Use Case.

392
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Alexander Lipton and Adrien Treccani, Blockchain and Distributed Ledgers: Mathematics, 4. Roger Wattenhofer, Distributed Ledger Technology - The Science of the Blockchain, Second
Technology, and Economics, World Scientific Edition, 2022. Revised Edition, 2017, Inverted Forest Publishing, ISBN-13 978-1544232102.
2. Horst Treiblmaier and Trevor Clohessy, Blockchain and Distributed Ledger Technology Use 5. Focus Group on Application of Distributed Ledger Technology,
Learning
Cases: Applications and Lessons Learned, Springer, 1st edition, 2020. Https://www.itu.int/en/ITUT/focusgroups/dlt/Pages/default.aspx
Resources
3. Imran Bashir, Mastering Blockchain: Deeper insights into decentralization, cryptography,
Bitcoin, and popular Blockchain frameworks, 2018 - Packt Publishing, ISBN-10:
1788839048.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Vinod Potty, Project Manager / Infosys 1. Dr. M. Subramaniam, Professor/CBIT 1. Dr. T. Nadana Ravishankar, SRMIST

393
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE435T SMART CONTRACTS AND APPLICATION DEVELOPMENT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
understand and evaluate the stack of protocols that will form the future Web 3.0 and its decentralized Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
nature
demonstrate a local Ethereum Network with Geth, and get familiar with a various development

The engineer and society


CLR-2:

Conduct investigations of

Individual & Team Work


Engineering Knowledge
environment

Design/development of

Project Mgt. & Finance


CLR-3: organize the inner workings of smart contracts as means for developing decentralized applications

Modern Tool Usage

Life Long Learning


complex problems
Problem Analysis

Communication
CLR-4: examine a set of technologies that support the backbone decentralized storage network

Environment &
Sustainability
CLR-5: evaluate the components of blockchain-based technologies which support Turing-complete languages

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: recall to Construct decentralized applications using the Web3 stack 3 2 2 - - - - - - - - - - - 2
CO-2: outline the smart contract development lifecycle 1 2 3 - - - - - - - - - - - 2
CO-3: identify to reuse common implementation patterns, like modifiers and contract driven development - 1 2 3 - - - - - - - - - 2 -
CO-4: discover smart contracts using the Solidity programming language - 2 2 1 - - - - - - - - - - 2
CO-5: determine the deep understanding of the Ethereum model and applications of blockchain - 3 2 1 - - - - - - - - - - 3

Unit-1 - Blockchain Concepts 9 Hour


Blockchain Evolution- Blockchain Structure- Blockchain Characteristics- Blockchain Application Example: Escrow- Blockchain Stack- From Web 2.0 to the Next Generation Decentralized web- Domain Specific
Blockchain Applications- Blockchain Benefits & Challenges.
Unit-2 - Smart Contracts 9 Hour
Structure of a Contract- Setting up and Interacting with a Contract using Geth Client- Gas- Logs- Events- Setting up and Interacting with a Contract using Mist Wallet- Smart Contract Examples- Smart Contract
Patterns.
Unit-3 - Blockchain Application Templates and Ethereum Development Tools 9 Hour
Blockchain Application Components- Design Methodology for Blockchain Applications- Blockchain Application Templates- Ethereum Clients- Go-Ethereum Client (geth)- Python Ethereum Client (pyethapp)-
Ethereum Languages- TestRPC- Mist Ethereum Wallet- MetaMask- Truffle- External Owned Account (EOAs)- Contract Account- Keypairs- Working with EOA Accounts- Working with Contract Accounts
Unit-4 - Decentralized Applications, Mining and Swam 9 Hour
Implementing Dapps- Case Studies- Consensus on Blockchain Network- Mining- Block Validation- Setting up Mining Node- State Storage in Ethereum- Swarm Architecture and Concepts- Incentive Mechanisms in
Swarm- Swarm Setup- Working with Swarm- Case Study: Stock Photos Dapp.
Unit-5 - Advanced Topics on Blockchain 9 Hour
Double-Spending Problem- Byzantine Fault Tolerance- Proof-of-Work vs Proof-of-Stake, - Consistency, Availability & Partition Tolerance (CAP)- Turing Completeness- G reedy Heaviest- Observed Sub-Tree
(GHOST)- Sybil Attack- Mining Pools and Centralization- Smart Contracts Vulnerabilities- Blockchain Scalability

394
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and 3. Andreas M. Antonopoulos, Mastering Bitcoin Programming the Open Blockchain,2017
Learning cryptocurrency technologies: a comprehensive introduction. Princeton University Press. 4. Singhal, B., Dhameja, G., & Panda, P. S. (2018). Beginning Blockchain: A Beginner's guide
Resources 2. Antony Lewis,The Basics of Bitcoins and Blockchains An Introduction to Cryptocurrencies to building Blockchain solutions. Apress.
and the Technology that Powers Them ,2018 5. Albert Szmigielski, Bitcoin Essentials, 2016

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mrs.S.Gomathi Sankar , Technical Lead .LTIMindtree 1. Dr. Soma Prathibha Sri Sai Ram Engineering College,Chennai 1. Dr.A.Siva Kumar SRMIST
2. Mr.Dhilip Velumani, Module Lead,LTIMindtree 2. Dr.S.V.N. Santhosh Kumar VIT Vellore 2. Dr.S. Ganesh Kumar SRMIST

395
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE436T BITCOIN ESSENTIALS AND USE CASES E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand what Bitcoin is, how it works and how to start using it safely and effectively 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the mechanism of Bitcoin with both hardware and software

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: analyze how to store and use bitcoin

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: evaluate the use cases of Blockchain today with a deep dive on cryptocurrencies like Bitcoin

Environment &
Sustainability
CLR-5: evaluate the use of bitcoin in various applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the fundamentals of Bitcoin 1 2 - - 3 - - - - - - - 2 1 -
CO-2: deal with the methods of Bitcoin transactions 1 2 - - 3 - - - - - - - 1 2 -
CO-3: gain knowledge about various operations associated with bitcoin mining 2 3 - - 2 - - - - - - - - 1 2
CO-4: learn and educate about bitcoin use cases 1 3 - - 3 - - - - - - - - - 2
CO-5: gather knowledge on Bitcoin storage and protocols 2 3 - - 1 - - - - - - - - - 3

Unit-1 - Bitcoin (BTC) Introduction 9 Hour


features- Bitcoin’s Predecessors- Roots of bitcoin -Bitcoin’s Ecosystem- Bitcoin wallets- Types of wallets- Building A Bitcoin payment system: Getting started with Bitcoin, Building a payment gateway
Unit-2 - Bitcoin Network 9 Hour
Store and use bitcoins- Hot and Cold storage--Getting bitcoin- Spending Bitcoin-Saving bitcoin- Investing Bitcoin-Protecting bitcoin- Transferring Bitcoin-Accepting bitcoin- Decentralization in Bitcoin- Bitcoin protocol
limitations and improvements-Distributed consensus- Incentive Mechanism-Block Reward-Transaction fee
Unit-3 - Bitcoin Mining 9 Hour
Bitcoin Mining Hardware- Bitcoin Mining software-CPU Mining-GPU Mining-FPGA Mining -ASIC Mining -Solo Mining- Pool Mining- Large scale mining-Energy consumption and ecology
Unit-4 - Mechanics of Bitcoin 9 Hour
Bitcoin transactions- Bitcoin Transaction Standards- Constructing a transaction- Types of transaction- Bitcoin scripts- applications of bitcoin scripts- Bitcoin blocks- Bitcoin Security- Bitcoin addresse
Unit-5 - Bitcoin use Case 9 Hour
Bitcoin as a Platform- Bitcoin as an append-only log- Bitcoins as “smart property”- Secure multiparty lotteries in bitcoin- Bitcoin as a public randomness source- Prediction markets and real-world data feeds- Bitcoin
as a Currency- Bitcoin as an Investment. Future of bitcoin: Decentralized Institution

1. Narayanan, A., Bonneau, J., Felten, E., Miller, A., and Goldfeder, S. (2016). Bitcoin and 4. Albert Szmigielski, Bitcoin Essentials, 2016
cryptocurrency technologies: a comprehensive introduction. Princeton University Press. 5. Daniel Forrester, Mark Solomon, Bitcoin Exposed: Today’s Complete Guide to
Learning
2. Andreas M. Antonopoulos, Mastering Bitcoin Programming the Open Blockchain,2017 Tomorrow's Currency
Resources
3. Pedro franco, Understanding Bitcoin Cryptography, Engineering and Economics,2015 6. Antony Lewis, The Basics of Bitcoins and Blockchains an Introduction to
Cryptocurrencies and the Technology that Powers Them ,2018
396
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.V. Gopinath, Solution Architect, Tata Consultancy 1. Dr.R.Manoharan, Professor, Department of Computer Science and 1. Dr. Panimalar.K, SRMIST
Service Ltd., Chennai Engineering, Puducherry Technological University, Puducherry,

397
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE437T DECENTRALIZED APPLICATIONS ON BLOCK CHAIN E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: discover the fundamentals & basic technologies used for DAPP 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquire knowledge in Smart contracts and Ethereum technologies

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: exploring the services and techniques in Ethereum Technologies

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: analyze and implement the different leading DAPP's

Environment &
Sustainability
CLR-5: compare & contrast the different Case studies related to DAPP's

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: summarize the knowledge of Decentralized Applications (DAPP's) 3 - - - - - - - - - - - 2 - 2
CO-2: interpret the features and technologies of DAPP 3 2 - - - - - - - - - - 2 - 2
CO-3: analyze and design smart contracts & Geth 3 3 2 - - - - - - - - - 2 - 3
CO-4: generate DAPP's using Ethereum platform 3 3 - - 2 - - - - - - - 2 - 3
CO-5: design and synthesize Decentralized Block chain applications 3 3 2 - 2 - - - - - - - 2 - -

Unit-1 – Basics of Decentralized Applications 9 Hour


Introduction to decentralized application, bitcoin, Features of DAPP, History of DAPP, Dapps Vs. Conventional centralized applications, Anatomy of a Dapp, Basic terminologies, Enabling technologies, Good and
bad DAPPs, A five-minute Dapp implementation.
Unit-2 – Flourishing DAPP Ecosystem 9 Hour
Decentralized - data, wealth, Identity, Computing, Bandwidth, Decentralized markets for Decentralized assets, Practical decentralization, A deeper look at Decentralized applications, Block chain technologies and
Ethereum technologies.
Unit-3 – Ethereum Platform 9 Hour
Connecting to Ethereum through the wallet, Smart contracts; the brain of DAPPs, Connecting to Ethereum with geth, managing accounts with geth, Revisiting simple coin's contract.
Unit-4 – Building Your First DAPP 9 Hour
Decentralized architecture, Introduction to IPFS, DAPP building, setup, Routing, Data storage and retrieval, DAPP economics, Private networks, Human-readable names.
Unit-5 – Platforms and Case Studies 9 Hour
Basics of Ethereum ecosystem, Managing life cycle, Security considerations, OpenBazaar, LightHouse, and La’Zooz.

1. Shahid Shaiikh, “Building Decentralized Blockchain Applications”, 2021, BPB Publications, 4. Siraj Raval, "Decentralized Applications Harnessing Bitcoin’s Blockchain Technology", 2016,
ISBN: 978-9389898620 O'Reilly, ISBN: 9781491924549.
Learning
2. Roberto Infante, "Building Ethereum DApps_ Decentralized Applications on the Ethereum 5. Free to use forum rusted and used by top Blockchain projects.
Resources
Blockchain", 2019, Manning Publications. https://www.dapp.com/app/eos-forum
3. Elad Elrom, “The Blockchain Developer”, 2019, Apress Publication, ISBN: 9781484248478.
398
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mrs. Malathy Selvaraj, Team Lead / TCS 1. Dr. R. Shriram, Professor / VIT Bhopal 1. Dr. T. Nadana Ravishankar SRMIST

399
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE438T WEB SECURITY E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
identify the basics of Web Security and detailed exploration of computers, communication links and that Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
makeup the web
CLR-2: understand the science of Cryptography and the Web and specifically looks at the encryption algorithms

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: explore the privacy protecting techniques to increase the privacy while using the web

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: address the physical security for web servers to protect the Computer Hardware

Environment &
Sustainability
CLR-5: understand the access control of the web content in the web server

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify the basics of Web Security and detailed exploration of World Wide Web 3 - - - - - 2 - - 2 - - 2 - -
CO-2: understand the science of Cryptography with emphasis on Public Key Algorithms 3 - 3 - 2 - - - - - - - 1 - -
CO-3: explore the techniques to increase your privacy while using the web - 3 - 2 3 - - - - - - - - 3 -
CO-4: addressing physical security for web servers for protecting the Computer Hardware - 2 2 - - - - 1 - - - - - - 2
CO-5: focuses on issuing security to the web content of the web server 2 - - 3 - - - 2 - - - - - 2 -

Unit-1 - Basics of Web Security 9 Hour


The Web Security landscape: The Security Problem-Securing the Web Server-Securing Information in Transit-Securing the User’s Computer-Risk Analysis and Best Practices-The Architecture of the World Wide
Web: History and Terminology-Building Terminology-Weaving the Web-The Domain Name Service-Who owns the Internet: Your Local Internet Service Provider- Network Access Points and Metropolitan Area
Exchanges- The Root and Top-Level Nameservers- The Domain Registrars- Internet Number Registries
Unit-2 - Cryptography in Web Security 9 Hour
Understanding Cryptography: Roots of Cryptography- Symmetric Key Algorithms- Public Key Algorithms-Public Key Algorithms-Message Digest Functions-Cryptography and Web Security-Understanding SSL and
TLS-Digital Identification I: Passwords, Biometrics, and Digital Signatures-Digital Identification II: Digital Certificates, CAs, and PKI
Unit-3 - Privacy and Security for Web Users 9 Hour
The Web’s War on Your Privacy-Log Files-Understanding Cookies-Web Bugs- Privacy-Protecting Technologies-Backups and Antitheft-Mobile Code I: Plug-Ins, ActiveX, and Visual Basic-Mobile Code II: Java,-
JavaScript-Flash-Shockwave
Unit-4 - Web Server Security 9 Hour
Physical Security for Servers: Protecting your Computer Hardware, Protecting Your Data, Case Study: A Failed Site Inspection-Host Security for Servers: Securing the Host Computer, Operating Securely, , Secure
Remote Access and Content Updating, Firewalls and the Web - Securing Web Applications-. Deploying SSL Server Certificates-Securing Your Web Service-Computer Crime
Unit-5 - Security for Content Providers 9 Hour
Controlling Access to Your Web Content-Client-Side Digital Certificates-Code Signing and Microsoft’s Authenticode-Pornography, Filtering Software, and Censorship-Privacy Policies, Legislation, and P3P- Case
Study: Securing Web Applications, Web Vulnerability Scanners: A Case Study.

400
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Izzat Alsmadi “The NICE Cyber Security Framework” Springer, ISBN: 978-3-030-02359-7, 4. William Stallings “Cryptography and Network Security” 6th Edition, PEARSON, ISBN-13:
2019 978-0-13-335469-0, 2013
Learning 2. Richard Fox, Wei Hao, “Internet Infrastructure, Networking Web Services and Cloud 5. Peter Morville, Louis Rosenfeld “Information Architecture” 3rd Edition, O’REILLY, ISBN-13:
Resources Computing” CRC Press, ISBN-13: 978-1-1380-3991-9, 2017 978-0-596-52734-1, 2006
3. John Paul Mueller, "Security for Web Developers" 1st Edition, O'REILLY, ISBN: 978-1-491- 6. Simson Garfinkel, Gene Spafford "Web Security, Privacy and Commerce" 2nd Edition,
92864-6, 2015. O'REILLY,ISBN: 978-0-596-00045-5, 2002

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Winston Nesayyan, 1. .Dr Dheeba J, Associate Professor, 1. Dr Jeba Sonia J, SRMIST
Senior Associate Software Engineer, JP Morgan, Philadelphia Department of Analytics, Vellore Institute of Technology Vellore

401
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

UNDERGRADUATE/ INTEGRATED POST


GRADUATE DEGREE PROGRAMMES
(With exit option of Diploma)

(Choice Based Flexible Credit System)

Regulations 2021

Volume – 11J
(Syllabi for Computer Science and Engineering w/s in
Gaming Technology Programme Courses)

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

402
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Core Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

403
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course SOFTWARE ENGINEERING PERSPECTIVES IN Course L T P C
21CSC306J C PROFESSIONAL CORE
Code Name COMPUTER GAME DEVELOPMENT Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the games and software engineering research 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: utilize the game jam organization

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: apply the casual games and development process

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: implement the evaluation and design of games

Environment &
Sustainability
CLR-5: analyze the mixed reality game cards

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire knowledge on fundamentals of games and software engineering research 3 1 - - 3 - - - - - - - - - -
CO-2: perform the game jam organization and evaluate it 2 2 - - 3 - - - - - - - - - 3
CO-3: perform casual games process - 2 3 - 3 - - - - - - - - - -
CO-4: identify evaluation and design framework - 3 - 2 3 - - - - - - - - - 3
CO-5: understand how reality game cards implemented - 2 3 2 3 - - - - - - - - - 3

Unit-1 - Introduction 12 Hour


The Interdisciplinary Nature of Computer Games- A Brief History of Computer Games- Recent Advances in Games and Software Engineering Research
Unit-2 – Software Engineering Perspective 12 Hour
Case Studies and Practices in Local Game Jam Software Development Organization: A Software Engineering Perspective- Introduction- Organizational Forms for Local Game Jams and Related Game Creation
Events- Local Game Jam and Game Production Field Studies- Observations, Lessons Learned, And Learnable Lessons for Game Jam Organizational Forms- Game Software Development Competitions
Unit-3 – Game Development Process 12 Hour
Building Casual Games and APIs for Teaching Introductory Programming Concepts- Introduction- GAMES AND CS1/2 Classes- API Design Guidelines- The Development Processes- GTCS Foundations Game
Engine- The Space Smasher API- The Corrupted API.
Unit-4 – Game Design Framework 12 Hour
Evolution of a Model for The Evaluation of Games for Software Engineering Education- MEEGA- Learning with The Body: A Design Framework for Embodied Learning Games and Simulations- The Embodiment
Problem-Toward A Design Framework for Embodied Learning Games and Simulations- Applying the Design Framework
Unit-5 – Case Study and Future Research 12 Hour
Using Ideation Cards for Designing Mixed Reality Games- ideation cards- mixed reality game cards- Design Lessons for Ideation Cards- Theme Cards- Role-Playing Game to Exergame- Survey on Software
Architecture, Creativity, And Game Technology- Future Research Opportunities

404
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Lab Experiments
1. Formal Game Development Proposal Stage-1 Includes the Steps Game 9. Report on development progress, challenges, and future work
2. Description Overview, Background Story, and Design Decision 10. Alpha release after partial game development progress, challenges, and future work
3. Formal Game Development Proposal Stage-2 Includes Technical 11. Conduct playtesting session with different play test methods
4. Achievement, Development Schedule, Layered Task Breakdown, Functional 12. Record the play testing questions and comments
5. Minimum, Task List, Timeline and Assessment 13. Design revisions based on play test
6. Prototype setup for the game described 14. Results, experience, and conclusions
7. Testing - prototype' s playing experience 15. Reports on personal impressions
8. Prototype' s experience findings and conclusion

1. Software Engineering Perspectives in Computer Game Development, Kendra M. L. Cooper, 2021. 3. Chau, Brian, et al. "Building Casual Games and APIs for Teaching Introductory
2. Scacchi, Walt. "Case Studies and Practices in Local Game Jam Software Development Programming Concepts." FDG. 2015.
Learning
Organization: A Software Engineering Perspective." Software Engineering Perspectives in 4. Wang, Alf Inge, and Njål Nordmark. "Survey on Software Architecture, Creativity, and
Resources
Computer Game Development. Boca Raton and London: CRC Press, 2020. 37-57. Game Technology." Software Engineering Perspectives in Computer Game
Development. Chapman and Hall/CRC, 2021. 253-278.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr Jai Naresh, South Region Head, 1. Dr.S. Venkatesan,IIITM,Alahabad 1. Dr. A. Murugan, SRMIST
Media Entertainment Cell, and council
2. Mr Ajay Kumar, Consultant, Scopik edutech private limited.

405
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC307T DEEP LEARNING IN GAMING AND APPLICATION C PROFESSIONAL CORE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basics of Deep Learning and Neural networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: build, train, and test basic Convolutional and Recurrent Networks

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


CLR-3: relate the working knowledge on GAN for Games

Modern Tool Usage

Life Long Learning


complex problems
examine Reinforcement Learning tasks and the core principals behind the Deep Reinforcement

Problem Analysis
CLR-4:

Communication
Learning

Environment &
Sustainability
CLR-5: recognize the applications of deep learning in Gaming development

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify the importance of deep learning architecture and its applications 3 1 - - 3 - - - - - - - - - -
CO-2: appreciate the importance of Convolutional and Recurrent Networks in game development 3 2 2 - 3 - - - - - - - - - 3
CO-3: identify and apply foundational theories and approaches of GANs for Game development 2 2 3 - 1 - - - - - - - - - 2
CO-4: implement Code common algorithms in Deep Reinforcement Learning 3 3 2 2 3 - - - - - - - - - 2
CO-5: apply the power of Deep Learning to build complex reasoning tasks 2 3 3 3 3 - - - - - - - - 2 1

Unit-1 - Deep Learning for Games 9 Hour


The Past, Present and Future of DL-Neural Networks the Foundation- Multilayer Perceptron in TensorFlow- TensorFlow Basics- Training Neural Networks with Back propaganda – The Cost Function – Partial
differentiation and the chain rule – Building an autoencoder with Keras – Training the model – Examining the output
Unit-2 - Convolutional and Recurrent Networks 9 Hour
Convolutional neural networks – Monitoring training with Tensor Board – Understanding Convolution – Building a self-driven CNN- Spatial Convolution and pooling – The need for Dropout – Memory and recurrent
networks – Vanishing and exploding gradients rescued by LSTM – Playing Rock, Paper, Scissors with LSTMs.
Unit-3 - GAN for Games 9 Hour
Introducing GANs – Coding a GAN in Keras – Training a GAN – Optimizers – Generating textures with a GAN – Batch Normalization – Leaky and other ReLUs – A GAN for creating music – Training the music GAN
– Generating Music via an alternative GAN.
Unit-4 - Deep Reinforcement Learning 9 Hour
Introduction to Deep Reinforcement learning – The multi-armed bandit – Contextual bandits – RL with the Open AI Gym – A Q-Learning model – Markov decision process and the Bellman equation – Q-learning –
Q-learning and exploration – Frist DRL with Deep Q-learning – RL experiments – Keras RL.
Unit-5 - Building a Deep Learning Gaming Chatbot 9 Hour
Neural Conversational Agents-General conversational Models-Sequence to Sequence Learning-Building the chatbot server-Running the chatbot in Unity-Case studies related to Development of Games using Deep
Learning

406
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Hands-On Reinforcement Learning for Games: Implementing self-learning agents in 2. Hands-On Deep Learning for Games, Michael Lanham, Packt Publishing, Year: 2019
Learning
games using artificial intelligence techniques, Michael Lanham, Packt Publishing, and 3. Ian Goodfellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2016 (available at
Resources
Year: 2020. http://www.deeplearningbook.org)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr Jai Naresh, South Region Head, Media Entertainment Cell, and council 1. Dr. Anbuchelian - Ramanujan Computing Center, Anna University 1. Ms.S. Sindhu, SRMIST
2. Mr Ajay Kumar, Consultant, Scopik edutech private limited

407
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Elective Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

408
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE235T GAME DESIGN, PROTOTYPING AND DEVELOPMENT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: identify the basic concepts of game prototypes and design 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: describe the key components and making a prototype around it

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


illustrate the programming skills, Identify the fun and the goal of the game, Design the content and rules
CLR-3:

Modern Tool Usage


of the game

Life Long Learning


complex problems
Problem Analysis

Communication
CLR-4: analyze and identify the bugs of the game

Environment &
Sustainability
CLR-5: predict how game development is a combination of Design, Engineering, and Production

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: recognize knowledge in prototyping, designing, and testing - 3 3 - - - - - - - - - - - -
CO-2: apply the knowledge of programming - - 3 2 - - - - - - - - - - -
CO-3: identify the array of game development techniques - 3 2 2 - - - - - - - - - - -
CO-4: prepare creatively in every level of game and present interactive game concepts with clarity - 3 3 2 - - - - - - - - - - 3
CO-5: employ the techniques used in the design, development, and documentation of games - - 3 3 - - - - - - - - - - 2

Unit-1 - Introduction to Game Development 9 Hour


Game Development Overview and Introduction, Game Design and Paper Prototyping: Thinking like a designer, Game Analysis Frameworks, Game Analysis Frameworks, Overview of Layers and Design Goal,
Inscribed Layer, Dynamic Layer, Cultural Layer and cultural impact of a game, Game Design Document: GDD to unity, giving controls to user, Prototyping Non player characters, UI coordinate systems: Choosing
the correct coordinate system, Building UI Canvas, UI Scripting, Profiling and Localization
Unit-2 - Game Testing 9 Hour
Why Playtest, Methods of Playtesting, Importance of Playtesting, many faces of testing, Testing life cycle, Design, prototype, alpha, beta testing, Math and Game Balance, Installing Apache OpenOffice Calc,
Examining Dice Probability with calc, Math of Probability, Randomizer technologies in paper games, Weighted distributions, permutations, positive and negative feedback.
Unit-3 - Game Design 9 Hour
Scott Kim on Puzzle Design, Puzzle examples in action Games, Guiding the player, Direct Guidance, Methods in Direct Guidance, Indirect Guidance, Methods in Indirect Guidance, Guiding Skills and concepts,
Digital Game Industry, About DGI, Game Education, Getting into the Industry
Unit-4 - Prototyping 9 Hour
Digital Prototyping: Thinking in digital systems, Systems Thinking: Game Analysis Learning Development Environment, Introducing C#: variables and components, Boolean Operations and conditionals Loop, List
and Arrays, Functions and Parameters, Debugging, Classes, Object Oriented Thinking, Agile Software Development, Scrum Methodology, Burn down charts
Unit-5 - Testing 9 Hour
Game Testing Disciplines, Bugs: Bugs Severity Levels, Balance testing, Decision Makers: Overview, Game Producers, Game Testers, Bug Categories, Documentation, Test Plan, Bug Spotting/ Hunting, Reports
and Verifications, Mobile Games Testing-Process of Testing Mobile Games and Phases of Mobile Game Testing

409
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Jeremy Gibson Bond, "Introduction to Game Design, Prototyping, and Development: 3. Luis Levy, Jeannie Novak," Game Development Essentials: Game QA & Testing", Cengage
Learning From Concept to Playable Game with Unity and C#", 2nd Edition, 2017. Learning, Inc, 2009.
Resources 2. Stephen Gose, " Phaser Game Prototyping: Building 100s of games using Game 4. https://www.gamedesigning.org/learn/unity/
Prototyping templates in HTML5 and Phaser JavaScript Framework",2017 5. https://www.testbytes.net/blog/game-testing-tutorial/

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.D.Saravanan, Senior Manager, Cashkaro.com 1. Dr.P. Siddique Ibrahim, VIT, AP 1. Dr.D.Rajeswari, SRMIST

410
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE236T GPU PROGRAMMING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: identify the fundamentals of GPUs & its basic architecture 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate the Data Parallelism and CUDA and its execution model

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: study the CUDA Memories, floating point, and performance consideration

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand and Learn OpenCL programming for parallel processing

Environment &
Sustainability
CLR-5: analyze the parallel patterns problem and heterogeneous computing

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: study on the fundamentals of GPU, Architecture and APIs - - - - - - - - - - - - - 2 -
CO-2: analyze the knowledge and functions on CUDA C and acquire the ability to use parallelism 1 2 - - 2 - - - - - - - - - -
CO-3: obtain the knowledge on CUDA memory types and floating-point operations 2 - - - 2 - - - - - - - - - -
CO-4: apply OpenCL programs for designing parallel programs with CUDA - 2 2 - 2 - - - - - - - - - -
illustrate the knowledge gained on parallel patterns and heterogeneous computing clusters towards
CO-5: 1 2 3 - 3 - - - - - - - - - 2
application development

Unit-1 - Basic of GPU 9 Hour


Introduction to GPU, Heterogeneous Parallel Computing, Architecture of a Modern GPU, Need of speed, Speeding Up Real, Applications, Parallel Programming Languages and Models, Overarching Goals, History
of GPU Computing, GPGPU - GPU Computing, Scalable, Recent Developments, Future Trends, Introduction APIs, CUDA C, OpenCL ,Brook, OpenACC, APIs
Unit-2 - Data Parallelism and CUDA Structure 9 Hour
Introduction to Data Parallelism and CUDA C, CUDA Program Structure, A vector addition kernel, Device Global Memory, Programming Exercise – Hello World, Data Transfer, Kernel Functions and Threading
Example, Data Parallel Execution Model – CUDA Thread Organization, Mapping Threads to Multidimensional Data, Matrix Multiplication, Synchronization, Transparent Scalability, Assigning Resources to Blocks,
Querying Device Properties, Thread Scheduling and Latency Tolerance- example
Unit-3 - CUDA Memory Concepts 9 Hour
CUDA Memories and its efficiency, Importance of Memory Access, CUDA Device Memory Types, Comparison with Von Neumann and shared buffers, A Strategy for Reducing Global Memory Traffic, Carpooling
Example, A Tiled Matrix - Matrix Multiplication Kernel., Illustration, Memory as a Limiting Factor to Parallelism, Performance Consideration – Warps and Thread Execution, Example, Global Memory Bandwidth,
Illustration.
Unit-4 - Open CL Program 9 Hour
OpenCL basics, Introduction, Platform model, Execution mode, Kernels and OpenCL programming model, Vector addition using OpenCL, Image rotation and convolution, using OpenCL, The kernel execution
domain, Work Item, Workgroups, NDRanges, Application: Image clustering using OpenCL
UNIT-5 - MPI Concepts 9 Hour
Parallel Patterns, Convolution, Prefix sum, Sparse Matrix, Vector Multiplication, Application: Advanced MRI reconstruction, A running example, MPI basics MPI point –to- point Communication types, programming
a heterogeneous computing cluster, Overlapping Computation and Communication, MPI Collective Communication

411
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. David B. Kirk, Wen-mei W. Hwu, Programming Massively Parallel Processors – A 3. David R. Kaeli, Perhaad Mistry, Dana Schaa, Dong Ping Zhang, ―Heterogeneous Computing with
Learning Hands-on Approach, Third Edition, Morgan Kaufmann, 2016 OpenCL, 3rd Edition, Morgan Kauffman, 2015
Resources 2. Shane Cook, CUDA Programming: ―A Developer‟s Guide to Parallel Computing with
GPUs (Applications of GPU Computing), First Edition, Morgan Kaufmann, 2012

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr Jai Naresh, South Region Head, 1. Assistant Professor in Computer Science and Engineering at National 1. Dr.M.Ramprasath, SRMIST
Media Entertainment Cell, and council Institute of Technology Srinagar Veningston K
2. Mr Ajay Kumar, Consultant, Scopik edutech private 2. Dr.K.Sitara Assistant Professor in Computer Science and Engineering at 2. Dr. R. Rajkumar, SRMIST
limited National Institute of Technology, Trichy

412
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE237T ART CREATION FOR GAMES E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce the skills needed by game designer 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate the idea needed for a game

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: analyze the most common types of game balance

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: explain the interest curves and shadows and colors

Environment &
Sustainability
CLR-5: create the 2D and 3D animations

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the game design, production, and development 3 - 2 - 2 - - - - - - - 2 2 -
CO-2: identify navigation and manipulating objects 2 - 2 - - 2 - - - - - - 2 2 -
CO-3: introduce to camera properties 3 2 2 - - - - - - - - - 2 - 2
CO-4: create material and apply texturing 2 - 2 - - - - - - - - - - - -
CO-5: animate and Manipulate materials 3 2 2 - - - - - - - - - - - -

Unit-1 - Introduction to Game Design and Production 9 Hour


What is game development, Different type of game and use cases (FPS, RPG, Racing, Fighting, Casual, and Money spinner, Casino, Massively Multiplayer Online (MMO) These games are played over a LAN (local
area network) or via the Internet? Simulations. Adventure. Real-Time Strategy (RTS). Puzzle. Action. Stealth Shooter. Combat) Revert Settings, Launching Your First Project, importing a Project, Switching Between
Projects, Customizing The UI
Unit-2 - Objects Navigation and Manipulating 9 Hour
How to do Navigation, Manipulating Objects -Taking different type of objects, how to create invisible object that hides objects behind it, How to position Game Objects, How to place Light Probes
Unit-3 - Introduction to Camera 9 Hour
Adjusting camera target, Camera Tracking, different types of camera-dolly, camera colour filter, camera zoom extend, switching cameras, get current camera, set as active camera, look around
Unit-4 - Material and Texturing 9 Hour
Creating simple shadows- creating planar shadows- creating projected shadows-Using grid in virtools-creating grid collision-Creating a background-creating a background colour using a background image
Unit-5 - Animating and Manipulating Material 9 Hour
Basic texture animation-creating pseudo-3D characters using sprites, animating material movement,2Dinterface, creating a 2D sprite-creating a 2D frame

Learning 1. Drawing Basics and Video Game Art: Classic to Cutting-Edge Art Techniques for 2. Fundamentals of Game Design, 3e Paperback – 2015 by Adams (Author)
Resources Winning Video Game Design by Chris Solarsk 3. https://www.udemy.com/unitycourse

413
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.K.Selvakumar, Team Lesd, TCS 1. Dr.N.Bhalaji,Asso.Prof, SSNCE 1. Dr.A.Chinnasamy, SRMIST

414
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE238T STORYTELLING FOR MARKETING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the fundamentals of Storytelling 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: analyze the uses of various Marketing

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: analyze the Storytelling Methods

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: evaluate the Business Applications of Storytelling

Environment &
Sustainability
CLR-5: create the Storytelling as a Marketing Tools and its goal

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand Historical & Scientific Context of Storytelling 2 - - 2 - - - - - - - - 2 2 -
CO-2: understand audience relationship in storytelling and marketing 2 - - 2 - - - - - - - - 2 2 -
CO-3: recognize storytelling frameworks & techniques 2 - - 2 - - - - - - - - 2 2 3
CO-4: apply business applications of storytelling 2 - 2 2 - - - - - - - - 2 - -
CO-5: implement marketing applications of storytelling -2 - 2 2 - - - - - - - - 2 2 -

Unit-1 - Introduction to Historical and Scientific 9 Hour


Context of Storytelling, Oral Tradition of Storytelling: Definition, History & Examples, Role of Storytelling in Human Development, The Power of Storytelling for Building Business Relationships, The Neuroscience of
Storytelling, Relatability & Psychology of Storytelling, Novelty in Storytelling: Significance & Impact
Unit-2 - The Audience Relationship in Storytelling Marketing 9 Hour
Relating to Your Business' Target-Market Audience, Story Matrix: Components & Marketing Application, Story-Relationship Funnel: Concept & Application, Storytelling Flywheel: Create, Connect & Optimize, How
to Build Deep Audience Relationships Through Storytelling
Unit-3 - Storytelling Frameworks and Techniques 9 Hour
The Hero's Journey: Campbell's Archetype, Harmon's Story Circle: Explanation & Example, Ben Franklin's Deconstruction & Reconstruction Method, Conciseness in Writing: Definition & Meaning
Unit-4 - Business Applications of Storytelling 9 Hour
Using Storytelling to Enhance Business Relationships, Using Storytelling to Build Effective Business Presentations, What is Idea Generation? - Definition, Process & Techniques, Creating a Culture of Storytelling
at Work
Unit-5 - Marketing Applications of Storytelling 9 Hour
Storytelling as a Marketing Tool, Developing Goals & Strategies for Digital Content Marketing, Creating a Product Image Through Storytelling, Storytelling for Non-Profit Marketing, What is Viral Marketing? -
Definition, Techniques & Examples, Experiential Marketing: Definition, Strategies & Example, What is Movement Marketing? - Definition & Examples

Learning
1. Storytelling in business NYU Stern School of Business Ron Shacha MBA Summer 2019
Resources

415
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.K.C.Suresh,Projectb Head, mindtree technologies private limited 1. Dr.P.Selvakumari, Asso.Prof, CIT 1. Mr.C.Arun, SRMIST
2. Dr.A. Chinnasamy SRMIST

416
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE339T GAME ARTIFICIAL INTELLIGENCE E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the basics of Artificial Intelligence and challenging factors in developing games 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the different algorithms for game development

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: observe the methodology of path finding

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: summarize the commands and tools to develop the game

Environment &
Sustainability
CLR-5: design games using artificial intelligence techniques

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: explain the basic concepts of artificial intelligence and its challenging factors 3 - - - - - - - - - - - 2 - -
CO-2: describe the various algorithms in game development 2 3 3 - - - - - - - - - - 2 2
CO-3: illustrate the different methodologies of path finding - 2 2 - - - - - - - - - - - -
CO-4: choose the suitable tool for game design - 2 2 - 3 - - - - - - - - - 2
CO-5: select the appropriate design for artificial intelligence games - - 3 - 3 - - - - - - - - - 3

Unit-1 - Introduction to Game AI 9 Hour


Introduction of AI and Games, models of game AI, Kinds of AI Games, complexity, and constraint, Speed, Memory, AI Engine
Unit-2 - Movement Techniques 9 Hour
Basics of Movement Algorithms, Steering Behaviors, Combining Steering Behaviors, Predicting physics, Motor Control, Movement in the Third Dimension
Unit-3 - Pathfinding Methods 9 Hour
Basic Pathfinding and waypoints, Graphs -Dijkstra, A*, Representation, Continuous Time path finding, Movement Planning
Unit-4 - Decision Making and Diagnostic tools 9 Hour
Decision Making, Finite state Machine, Fuzzy Logic, Rule based AI, Al Commands, AI diagnostic Tools, Building an Al Diagnostic Tools, A Data-Driven Architecture for Animation Selection
Unit-5 - Designing Game AI 9 Hour
Designing Game AI- The Design- Shooters- Driving- Real-Time Strategy- Sports- Turn-Based Strategy Games, case study: heuristic cost calculation for 4 queens, tic tac toe problem

1. Paul Roberts Artificial Intelligence in Games, 1st Edition), Published by CRC Press, July 28, 4. AI Game Programming Wisdom, Thomson Learning, Inc. – a series of books on various
2022 ISBN 9781032033228 aspects of game development
Learning 2. Ian Millington, John Funge, Artificial intelligence for Games, Third edition, CRC Press 5. David M. Bourg, Glenn Seemann, AI for Game Developers, O'Reilly Series, 2004, ISBN:
Resources publishers, 2019, ISBN: 9781351053280 9780596005559.
3. Georgios N. Yannakakis, and Julian Togelius, Artificial Intelligence and Games, (1st Edition),
Springer, 2018, ISBN 978-3-319-63519-4

417
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr Jai Naresh, South Region Head, 1. Dr.B.Surendiran, NIT, Pondicherry 1. Dr.G.Premalatha, SRMIST
Media Entertainment Cell, and council
2. Mr Ajay Kumar, Consultant, Scopik edutech private limited.

418
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE340T ANALYTICS AND DECISION MAKING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
understand the fundamental terms, concepts and theories associated with the phases of Decision Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
Support Systems
CLR-2: highlight the uses of various mathematical models, data warehousing and mining

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gather the skills in analysis, design, and implementation of group support

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: link expert system as a subsystem of DSS

Environment &
Sustainability
CLR-5: track the knowledge representation methods

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
explain the fundamental terms, concepts and theories associated with the phases of decision support
CO-1: 2 - - - - 2 - - - - - - 2 - -
systems
CO-2: describe the uses of various mathematical models, data warehousing and mining - 3 2 - - - - - - - - - - - -
CO-3: discuss and develop skills in the analysis, design, and implementation of group support 2 - 2 - 3 - - - - - - - 2 - -
CO-4: illustrate expert system as a subsystem of DSS 2 2 - - - - - - - - - - - 2 -
CO-5: present the knowledge representation methods 2 2 - - - - - - - - - - - - -

Unit-1 - Introduction 9 Hour


Managerial decision making, system modeling and support – preview of the modeling process, phases of decision-making process.
Unit-2 - Analysis 9 Hour
DSS components- Data warehousing, access, analysis, mining, and visualization-modeling and analysis-DSS development.
Unit-3 - Support Systems 9 Hour
Group support systems- Enterprise DSS- supply chain and DSS – Knowledge management methods, technologies, and tools.
Unit-4 - Expert System 9 Hour
Artificial intelligence and expert systems - Concepts, structure, types - Knowledge acquisition and validation - Difficulties, methods, selection.
Unit-5 - Semantic Network 9 Hour
Representation in logic and schemas, semantic networks, production rules and frames, inference techniques, intelligent system development, implementation, and integration of management support systems.

1. S.Christian Albright, Wayne L.Winston Business Analytics: Data Analysis and Decision 3. Vicki L. Sauter, "Decision Support Systems for Business Intelligence", 2nd Edition, Wiley 2012.
Learning Making, 5TH edition, Cengage Learning, 2015. 4. Elain Rich and Kevin Knight, “Artificial intelligence”, TMH, 1993.
Resources 2. 23 Efraim Turban and Jay E Aronson, “Decision Support and Business Intelligent 5. S S Mitra, “Decision support systems, tools and techniques”, John Wiley, 1996.
Systems”, PHI, Eighth edition, 2010.

419
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr Jai Naresh, South Region Head, 1. Dr.Selvakumar, NIT Trichy 1. Dr.G.Premalatha, SRMIST
Media Entertainment Cell, and council
2. Mr Ajay Kumar, Consultant, Scopik edutech private limited.

420
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE341T COMPUTER GRAPHICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: gain knowledge about graphics hardware devices and software used 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the two/ three-dimensional graphics and their transformations

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: get knowledge about various object representation methods and visible surface detection methods

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the clipping techniques

Environment &
Sustainability
CLR-5: understand the illumination and color models

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: illustrate the importance of generating various output primitives 3 3 - - - - - - - - - - 1 - 1
CO-2: possess the ability to represent various curves and surfaces 3 2 - - - - - - - - - - 2 - 2
CO-3: understand various visible surface detection algorithms and color models 3 2 - - - - - - - - - - 2 - 2
CO-4: apply the knowledge to install and explore the interfaces of Unity 3 2 - - - - - - - - - - 2 - 3
CO-5: possess the ability to design and implement Surface Detection using Unity 2 2 - - - - - - - - - - 2 - 3

Unit-1 - Introduction 9 Hour


Computer Graphics Applications - Graphics System Overview - Raster scan systems, Random scan systems - Input, Output devices - Line drawing Algorithm-DDA - Line drawing Algorithm- Bresenhams - Midpoint
Circle Algorithm - Pixel addressing - Filled area primitives - Boundary Fill algorithms - Flood fill algorithms
Unit-2 - 2D Transformations 9 Hour
Geometric Transformations - Matrix Representation - Homogenous and Composite - 2D Viewing- pipeline and coordinate reference - window to viewport transformation - 2D Viewing function - Clipping - Point Line
- Cohen Sutherland - Liang Barsky, NLN, Polygon Clipping - Sutherland Hodgeman - Weiler-Atherton - Curve, Text, Exterior Clipping - Exterior Clipping
Unit-3 - 3D Transformations 9 Hour
3D Concepts - Object representation - Polygon surfaces and tables - Plane equations and meshes - Parallel Projection, Perspective Projection - Depth Cueing - Curved line & surfaces - Quadratic surfaces - Blobby
objects - Spline representation - Beizer Curves and surfaces - B-Spline Curves and surfaces - Quadratic surfaces
Unit-4 - 3D Geometric Transformations 9 Hour
3D geometric and modeling transforms - 3D Viewing - Viewing Pipeline - Viewing Coordinates & Projections - 3D Clipping - Visible Surface Detection methods - Back face detection - Z-buffer method, A-buffer
method - A Scan line method, Painter's algorithms - Area subdivision method - Octree - Ray casting method – BSP
Unit-5 - Illumination Effects 9 Hour
models of illumination - Halftone- Dithering techniques - Constant Intensity Shading-Gouraud Shading - Phong Shading – Ray Tracing Methods - Properties of Light - RGB, CMY Color Model - YIQ Color Model -
HLS Color Model - HSV Color Model - Color selection - Computer Animation

421
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Gabriel Gambetta, " Computer graphics from scratch: a programmer's introduction to 3. Donald Hearn & M. PaulineBaker, ―Computer Graphics C Versionǁ,2nd Edition, Pearson
3D rendering" San Francisco, California: No Starch Press, Inc., [2021], ISBN Education, 2010, ISBN 978-93-325-3587-9
Learning :1718500777 4. Peter Shirley, Michael Ashikhmin and Steve Marschner, "Fundamentals of Computer Graphics",
Resources 2. JohnF.Hughes, Andries VanDam, Morgan McGuire, DavidF.Sklar, James D.Foley, 3rd Edition, 2009, ISBN: 9781568814698
Steven K.Feiner, KurtAkeley,ǁComputer Graphics: Principles and Practiceǁ,3rdEdition, 5. Samit Bhattacharya, "Computer Graphics, 2015. Oxford University Press, ISBN13:978-0-19-
Addison-Wesley Professional, 2013 809619-1

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Deepan Chakravarthy, Project Manager, Temnos 1. Dr.S. Muthuraj kumar, Associate Professor, Anna university 1. Dr. Anand M, SRMIST

422
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE342T GAMING STUDIO FOR BUSINESS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
experience the roles and structure of a game development team as you realize your own games from Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
brainstorming to final delivery
CLR-2: learn the application of game design concepts to generate a new product

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


CLR-3: outline the development processes of rapid prototyping and iterative design

Modern Tool Usage

Life Long Learning


complex problems
explore the structure, methods, and economics of the games industry for decision-making and

Problem Analysis
CLR-4:

Communication
development

Environment &
Sustainability
CLR-5: develop entertaining games and analyse with marketing tools

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify the plan and functionalities for game studio setup 2 - - - - - - - - - - - - - 2
CO-2: practice the game design concepts to generate a new product 2 - 3 - - - - - - - - - - - 1
CO-3: choose the suitable approaches for game production 2 2 - 3 - - - - - - - - - - 3
CO-4: evaluate the games with different testing strategies - - 3 - - - - - 2 - - - - - 2
describe the team, resources, finances, marketing, community of players, operations, and development
CO-5: - - 3 - 2 - 2 - - - - - - - -
processes

Unit-1 - Introduction to Game Development 9 Hour


Development Tools and Resources- Game Development Systems- Unity- GameMaker Studio- Unreal Engine 4- Game Salad- App Game Kit, Art and Design Resources, Audio Resources, Outsourcing, Development
Tools, and Resources- Microsoft BizSpark- Adobe Creative Cloud
Unit-2 - Introduction to Prototype Design 9 Hour
Creating the Prototype- Laying the groundwork-stakeholder mapping, milestones -milestone plan, Case Study—Creating a Prototype in Unity- Developing First Unity Game
Unit-3 - Game Publishers on Different OS 9 Hour
Self-Publishing- Base Game Projects, Publishing on PC- Playable Free Alpha Demo- Early Access Release- Installers- Selling a PC Game, Publishing on Apple and Android, Partnering with Games Publishers
Unit-4 - Testing on Usability 9 Hour
Making the game-user experience (UX)- Audio-Localization-QA testing-QA Bug Tracking -Bug Tracking Software- Working with External QA- Language Translations- Age Ratings, PR and Reaching Out to the
Press- Copywriting Tips- Press Releases- Press Distribution Services
Unit-5 - Case Study 9 Hour
Marketing, Analytics- App Annie- Flurry- Swrve- Apmetrix, Advertising, Websites, Forums and Source Control, Funding, Tax, Legal and Other Odds and Ends.

Learning 1. The Game Production ToolboxBy Heather Maxwell Chandler · 2020, CRC Press 3. The Game Production Handbook By Heather Maxwell Chandler 2009, Infinity Science Press
Resources 2. The Indie Game Developer Handbook, Richard Hill-Whittall 2017

423
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr Jai Naresh, South Region Head, Media Entertainment Cell, and council 1. Dr.B.Surendiran, NIT, Pondicherry 1. Dr.G.Divya, SRMIST
2. Mr Ajay Kumar, Consultant, Scopik edutech private limited.

424
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE343T WEB SERVICES DEVELOPMENT FOR GAMES E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: identify the architecture and building blocks of web services 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand SOAP messages and XML

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: illustrate the UDDI and WSDL for web services

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: demonstrate the rust and web assembly for game development

Environment &
Sustainability
CLR-5: identify the animation, collision detection for endless runner

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: distinguish the different web service and its architecture - 1 - - - - - - - - - - - - -
CO-2: create SOAP messages and XML for communication - 2 - - - - - - - - - - - - -
CO-3: evaluate UDDI and WSDL for web services - 3 - - - - - - - - - - - - -
CO-4: develop games using rust and web assembly - 3 - - 2 - - - - - - - - - 2
CO-5: evaluate animation, collision detection for creating endless runner - 2 - - 2 - - - - - - - - - 3

Unit-1 - Web Service Architecture 9 Hour


Web Service Architecture – Web services Architecture and its characteristics, core building blocks of web services, standards, and technologies available for implementing web services, web services communication,
and basic steps of implementing web services. Describing Web Services – WSDL introduction, nonfunctional service description, WSDL1.1 Vs WSDL 2.0, WSDL document, WSDL elements, WSDL binding, WSDL
tools, WSDL port type, limitations of WSDL
Unit-2 - Overview of XML 9 Hour
XML Document structure, XML namespaces, Defining structure in XML documents, Reuse of XML schemes, Document navigation and transformation. SOAP: Simple Object Access Protocol, Inter-application
communication and wire protocols, SOAP as a messaging protocol, Structure of a SOAP message, SOAP envelope, Encoding, Service Oriented Architectures, SOA revisited, Service roles in a SOA, Reliable
messaging, The enterprise Service Bus, SOA Development Lifecycle, SOAP HTTP binding, SOAP communication model, Error handling in SOAP
Unit-3 - Registering and Discovering Services 9 Hour
Registering and Discovering Services: The role of service registries, Service discovery, Universal Description, Discovery, and Integration, UDDI Architecture, UDDI Data Model, Interfaces, UDDI Implementation,
UDDI with WSDL, UDDI specification, Service Addressing and Notification, Referencing and addressing Web Services, Web Services Notification
Unit-4 - Introduction to Rust, Web Assembly 9 Hour
Web assembly, A Rust project skeleton, drawing to the canvas, rendering a sprite- Loading images, Canvas coordinator, Drawing Images, JavaScript callbacks, Async Rust, Sprite sheets – Loading JSON, Parsing
JSON, Drawing with cookie cutter, Adding Animation.
Unit-5 - Creating Endless Runner 9 Hour
Creating a game loop- Request Animation Frame, Loading assets, Cleaner drawing, Integrating the game loop, State machine – definition, types, Managing Animation – Transitioning between states, managing,
integrating the state machine, Adding running state, Transitioning to sliding and back again, Creating a real scene, Axis aligned bounding boxes, Trimming the sprite sheet, Colliding with an obstacle, Refactoring
for endless running.
425
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Kelvin Sung, Jebediah Pavleas, Fernando Arnez, and Jason Pace, Build Your Own 2D 3. Eric Smith, Game Development with Rust and WebAssembly, Packt Birmingham, 2022
Learning Game Engine and Create Great Web Games, Apress, 2015. 4. XML, Web Services, and the Data Revolution, F.P.Coyle, Pearson Education, 2002.
Resources 2. Web Services & SOA Principles and Technology, Second Edition, Michael P. 5. Building web Services with Java, 2nd Edition, S. Graham and others, Pearson Education, 2004.
Papazoglou, 2012. 6. Java Web Services, D.A. Chappell & T. Jewell, O’Reilly, SPD, 2002.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.P.Mohan, Project Lead, Aspire Systems 1. Dr.V. Ilayaraja, VIT, Vellore 1. Dr. Rajeswari, SRMIST

426
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE344T 3D GAME DEVELOPMENT WITH UNITY E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the Game development fundamentals 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: explore the game objects in User interface

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: introduce scripting with unity basic features

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: apply various 3D models in UNITY

Environment &
Sustainability
CLR-5: create C# code with optimization

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: study the threatening genre and user interface 2 1 - - 3 - - - - - - - 2 - -
CO-2: explore the unity scripting 2 2 - - 3 - - - - - - - 2 - 2
CO-3: design the environment in UNITY 3 2 - - 3 - - - - - - - - 2 3
CO-4: analyse the functionality in UNITY 2 2 2 2 3 - - - - - - - - 2 3
CO-5: create the maze and menus in UNITY 3 3 3 2 3 - - - - - - - 2 2 3

Unit-1 - Genre and UI Basics 9 Hour


Graphical Adventure - Intriguing locations - Compartmentalizing environments - Parallax - Animation -, Genre - Unity UI Basics - Layout - Tool bar - Selecting and Focus - Transform Objects - 3D Objects.
Unit-2 - Unity Scripting 9 Hour
Installing Unity - Versions of Unity - New Project - New Scene - The Layout - Game Window - Components of Script - Anatomy of a function - Picking objects - Mouse Picks - Conditionals and state - Order of
Evaluation.
Unit-3 - Test Environment 9 Hour
Terrain Generation - Fly through Scene Navigation - Topography - Paint Texture - Paint Details - Creating own terrain assets - Terrain Settings - Shadows - Fog.
Unit-4 - Navigation and Functionality 9 Hour
Navigation - Arrow Navigation and input - Fun with Platforms - Plan - Collision Walls - Object names - Defining Boundaries - Cursor control - Custom Cursors - GUI Layer - Plot - Walk-through - Items - Flow Chart -
Interaction and State
Unit-5 - Maze and Menus 9 Hour
Relationship with Crypto - Top crypto and metaverse projects - NFT Games - Virtual real estate - NFT impact on Metaverse - Virtual real estate trend, Physical and virtual real estate - Cryptocurrencies.

1. Game Development Patterns with Unity 2021: Explore practical game development 3. Alan Thorn, Pro Unity Game Development with C#, Apress Springer, 2014.
using software design patterns and best practices in Unity and C#, 2nd Edition, 30 July 4. Game Development Essentials: Game Interface Design Misc. Supplies – 1 April 2017, by Jeannie
Learning
2021, by David Baron. Novak (Author), Kevin Saunders
Resources
2. Julia Naomi Rosenfield Boeira, Lean Game Development Apply Lean Frameworks to 5. Game Engine Architecture, Third Edition 3rd Edition, by Jason Gregory (Author) Advanced Game
the Process of Game Development, ISBN: 978-1-4842-3216-3, 2017. Design: A Systems Approach, 22 December 2017, by Michael Sellers.
427
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100% 100% 100%

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Sudara Raman, Scopik Ltd, Chennai. 1. Prof. Indrakishor, Department of Computer Science and Engineering, 1. Dr. R. Rajkumar, SRMIST
Poornima Institute of Engineering & Technology, Jaipur, Rajasthan.

428
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE345T GAME SYSTEM INTEGRATION E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: study fundamentals of Lean game design 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: work with product design

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: integrate the different gaming systems

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: design the games and its challenges

Environment &
Sustainability
CLR-5: develop the game development platform

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: study about Game Development 2 1 - - 3 - - - - - - - - - 1
CO-2: explore the Minimum Viable Product in Game Development 2 2 - - 3 - - - - - - - - - 2
CO-3: extract the continuous integration 3 2 - - 3 - - - - - - - - - -
CO-4: analyse the performance measure of games 2 2 2 2 3 - - - - - - - - - 2
CO-5: create game development using C# 3 3 3 2 3 - - - - - - - - - 3

Unit-1 - Lean Game Development 9 Hour


Lean Inception - Lean DevOps - Kanban -, Test Driven Development - Lean and Games - An Inception in Practice - Anatomy of Inception - Developing Personas - Brainstorming - Creating Hypothesis
Unit-2 - Minimum Viable Product 9 Hour
MVP - Building Prototypes - Thinking Simplest First - Splitting the MVG - Generating Hypotheses - Test driven Development - Applying TDD to Games - Making TDD Better.
Unit-3 - Continuous Integration 9 Hour
Team responsibilities regarding Continuous Integration - Code Versioning - Automated Build - Design and Build - A little bit of build - Test, Code - Test - Coding Game Artwork - Test Automation.
Unit-4 - Measuring and Analysis 9 Hour
Feedback - Ways of Measuring - Analyzing - Measuring Hypotheses - Creating Ideas for Iterating - First Ideation - Second Ideation - Limitations on Game Development.
Unit-5 - Metaverse Investments 9 Hour
Designing and Preparing - Event Handling - Power - Ups and Singletons - Player Controller - Weapons - Anime -, Graphical User Interfaces - Refinement and Improvements.

1. Game Development Patterns with Unity 2021: Explore practical game development 3. Alan Thorn, Pro Unity Game Development with C#, Apress Springer, 2019.
using software design patterns and best practices in Unity and C#, 2nd Edition, 30 July 4. Game Development Essentials: Game Interface Design Misc. Supplies – 1 April 2018, by Jeannie
Learning
2021, by David Baron. Novak (Author), Kevin Saunders
Resources
2. Julia Naomi Rosenfield Boeira, Lean Game Development Apply Lean Frameworks to 5. Game Engine Architecture, Third Edition 3rd Edition, by Jason Gregory (Author) Advanced Game
the Process of Game Development, ISBN: 978-1-4842-3216-3, 2017. Design: A Systems Approach, 22 December 2017, by Michael Sellers

429
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create 100% - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Ravikumar, CEO at Hackwit Technologies Pvt Ltd, Chennai. 1. Prof. Indrakishor, Department of Computer Science and Engineering, 1. Dr. R. Rajkumar, SRMIST
2. Poornima Institute of Engineering & Technology, Jaipur, Rajasthan

430
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE346T DESIGN ART AND THEORY E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce the skills needed by game designer 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate the idea needed for a game

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: determine the most common types of game balance

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: explain the interest curves and patterns within patterns

Environment &
Sustainability
CLR-5: determine the concepts of aesthetics

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the skills needed by game designer to handle approaches for game design 3 2 - - - - - - - - - - - - 1
CO-2: analyze ideas behind game design 3 2 - - - - - - - - - - - - 2
CO-3: apply the common types of game balance to make the goal easily understood 3 2 - - - - - - - - - - - - 1
CO-4: acquire knowledge on interest curves and what comprise interests 3 2 - - - - - - - - - - - - -
CO-5: utilize the concepts of aesthetics to govern the design 1 2 - - - - - - - - - - - - -

Unit-1 - Introduction 9 Hour


Introduction, Skills needed by Game designer, five kinds of listening, Three practical approaches to designing games, Introspection: Power, Perils and Practice, Dissect one's feelings, Essential Experience,
Definitions, What is a game? Four Basic elements, Unifying themes, Resonance
Unit-2 - Overview of Idea 9 Hour
Game begins with an idea - Inspiration, Problem Statement, The silent partner, Choosing an idea, Eight filters, Rule of the loop, Short history of software engineering, Risk assessment and prototyping, eight tips for
productive prototyping, Closing the loop, Einstein's violin, Project yourself, Demographics, Psychographics, Modeling, Focus, Empathy, Imagination, Motivation, Judgement, Space, Nested spaces, Object, attributes,
states, Actions, Rules, Skill
Unit-3 - Types of Game Balance 9 Hour
Twelve most common types of game balance - fairness, Challenge vs Success, Meaningful choices, Skill vs Chance, Head vs Hands, Short vs Long, Rewards, Punishment, Freedom vs Controlled Experience,
Simple vs Complex, Detail vs Imagination, The Puzzle of puzzles, Good puzzles, Puzzle principles - Make the goal easily understood, Make it easy to get started, Give a sense of progress, Give a sense of solvability,
Increase difficulty gradually, Parallelism lets the player rest, Pyramid structure, Hints, Answer, Perceptual shifts, Loop of interaction, Channels of information, List information, channels, Map information, Review
dimensions, Modes
Unit-4 - Game Interest 9 Hour
Interest curves, Pattern inside patterns, What comprise interests, Interest factor examples, Story/Game duality, Myth of passive entertainment, dream, reality, problems, dream reborn, story tips of game designers,
feeling of freedom, Indirect methods, Collusions, Transmedia worlds, power of pokemon, Transmedia worlds properties, Nature of game characters, Avatars, Creating compelling characters, Purpose of architecture,
Organizing game space, Christopher Alexander's ideas, Real vs Virtual architecture, Level design

431
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Aesthetics 9 Hour
Value of aesthetics, Learning to see, Let aesthetics govern the design, Use Audio, Balancing art and technology, Why we play with others, Tips for strong communities, Challenge of Griefing, Secret of successful
teamwork, Designing together, Team communication, Purpose of design documents, Document types, Engineering, Management, Writing, Players, Playtesting, questions- why, who, where, what, how, Technology
at last, Foundational vs Decorational, Hype cycle, Innovator's dilemma, Singularity, Look into crystal ball

1. Kramarzewski, Adam, and Ennio De Nucci. Practical game design: learn the art of game design 4. Hiwiller, Zack. Players making decisions: Game design essentials and the art of
through applicable skills and cutting-edge insights. Packt Publishing Ltd, 2018. understanding your players. New Riders, 2015.
Learning
2. Burgun, Keith. Game design theory: A new philosophy for understanding games. CRC Press, 2012. 5. Rouse III, Richard. Game Design: Theory and Practice. Jones & Bartlett Learning,
Resources
3. Schell, Jesse. The Art of Game Design: a Book of Lenses. Amsterdam; Boston: Elsevier/Morgan 2004.
Kaufmann, 2008.1.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 15% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Bhaskar Sahu, Schneider Electric Ltd, 1. Dr. K. S. Swarup, IIT Madras 1. Dr.P.C.Karthik, SRMIST
2. Dr.S.Paramasivam, ESAB, 2. Dr.S.Chandramohan ,Professor, CEG, Anna university 2. Dr.A. Murugan SRMIST

432
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE439T VIRTUAL REALITY AND AUGMENTED REALITY E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: illustrate the fundamentals concepts of VR 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: remember about standard Color models

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: discuss about VR Environment Concepts

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: apply and use of 3D Manipulation and interaction

Environment &
Sustainability
CLR-5: understand the usage of Augmented Reality

solutions

society

PSO-1

PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: discuss Virtual Reality Fundamentals 2 - - - - - - - - - - - - - -
CO-2: illustrate various color models concepts 1 - 2 - - - - - - - - - 2 - -
CO-3: apply the knowledge in VR Environment 1 2 1 - - - - - - - - - 2 - 2
CO-4: identify the concepts of 3D features 3 3 - - - - - - - - - - - - -
CO-5: apply Virtual Reality applications 2 - - 2 3 - - - - - - - - - 3

Unit-1 - Introduction to VR 9 Hour


Historical development of VR, Scientific landmarks Computer Graphics, Real-time computer graphics, Flight simulation, Virtual environments, Requirements for VR, Visual Displays, Auditory Displays, Haptic
Displays, Choosing Output Devices, Building Objects, Complex Shapes. Generation of fractal curves and landscapes using algorithms, Illustrate the aliasing and anti-aliasing techniques, Generation of Mandelbrot
and Julia set fractals.
Unit-2 - Color Models 9 Hour
Standard Primaries and the Chromaticity Diagram, Intuitive Color Concepts, RGB and CMY color models, HSV Colour Model, Colour Selection and Applications, World Space, World Coordinate, World Environment
example, VR Environment Example. Construct the primitives with different color models and simulate the conversion from one model to another, Develop a new texture and apply various mapping on 3D objects
Implementation of ray tracing concepts with the collection of 3D models
Unit-3 - Basic of VR Data Base 9 Hour
R Database, Tessellated Data, LODs, Lights and Cameras, Cullers, Occluders, Scripts, Graphical User Interface, Control Pane, VR toolkits, Software’ s for VR, Available operating systems, Available software,
Example, illustration
Unit-4 - Basic of 3D Task 9 Hour
3D Manipulation tasks, Example and Case study, Manipulation Techniques, Input Devices, Interaction Techniques for 3D Manipulation, 3D Travel Tasks, Environment Centered Wayfinding Support, Theoretical
Foundations of Wayfinding, Overview of Augmented Reality, Tracking for Augmented Reality, Augmented Reality Interaction, Collaborative Augmented Reality
Unit-5 - Basic of Augmented Reality 9 Hour
3D Augmented Reality Interfaces, Augmented Surfaces, and Tangible Interfaces, Agents in AR, Transitional AR-VR Interfaces, Heterogeneous user interfaces, Mobile Augmented Reality, annotating environment,
Annotating environment, Applications, Optical AR, Video AR, Heterogeneous AR, Mixed Reality case studies: Electronic circuit, Virtual class room, interior design, healthcare etc.

433
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Virtual Reality Systems, By John Vince, Pearson Education 2002 6. Steve Aukstakalnis , “Practical Augmented Reality: A Guide to the Technologies,
2. Virtual Reality Technology, 2nd, by Grigore C. Burdea (Author), Philippe Coiffet (Author), Wiley Applications, and Human Factors for AR and VR” 2016, Publisher(s): Addison-
Publications. June 2003 Wesley Professional
Learning 3. Augmented Reality: Principles & Practice Paperback – 12 Oct 2016 by Schmalstieg/Hollerer (Author) 7. Course on Virtual Reality, IIT Madras
Resources 4. Virtual & Augmented Reality for Dummies by Paul Mealy, Publication by John Wiley & Son July 2018 ttps://nptel.ac.in/courses/106/106/106106138/
5. Daniela, Linda. "New perspectives on virtual and augmented reality." Available at: https://www. 8. Foundation Course on Virtual Reality and Augmented Reality, IIT Madras,
Taylorfrancis. com/books/edit/10.4324/9781003001874/new-perspectives-virtual-augmented-reality- NPTELhttps://elearn.nptel.ac.in/shop/iit-workshops/completed/foundation-course-
lindadaniela, 2020. on-virtual-reality-and-augmented-reality/,3rd ed, Pearson,2016

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr Jai Naresh, South Region Head, Media 1. Mr.Veningston K Assistant Professor in Computer Science and 1. Dr. M. Ramprasath, SRMIST
Entertainment Cell, and council Engineering at National Institute of Technology Srinagar
2. Mr Ajay Kumar, Consultant, Scopik edutech private 2. Dr.K.Sitara Assistant Professor in Computer Science and Engineering at 2. Dr. Athira M Nambiar, SRMIST
limited. National Institute of Technology, Trichy

434
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE440T COMPUTER ANIMATION AND SIMULATION E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: illustrate concepts, approaches, and issues in the field of Animation & Simulation 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
increase the awareness of the students to the questions raised in the disciplines of computer science,

The engineer and society


CLR-2:

Conduct investigations of

Individual & Team Work


Engineering Knowledge
Animation, Simulation

Design/development of

Project Mgt. & Finance


CLR-3: focus on the interaction of these disciplines in approaching the study of gaming

Modern Tool Usage

Life Long Learning


complex problems
Problem Analysis

Communication
CLR-4: make specialization on topics central to Installation, Editing, navigation, animation & simulation

Environment &
Sustainability
CLR-5: learn other Simulation techniques in gaming technology

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the game graphics 1 2 2 2 - - - - - - - - - - 1
CO-2: analyze the editing, navigation, and workspaces 1 2 1 2 - - - - - - - - - - -
CO-3: evaluate the techniques of Animation & Simulation 3 3 - - - - - - - - - - - 2 -
CO-4: create Animation & simulation 3 3 3 - - - - - - - - - - - -
CO-5: apply Computer Animation & simulation - - - - - - - - - - - - - - 2

Unit-1 - Understanding the Interface 9 Hour


Download & Installation - Understanding the Interface - The Blender Screen (GUI - Headers- How to Quit Blender- How to Start Over-3D View Editor- Sidebar – Object Properties Panel- The Manipulation and Tool-
Outliner Editor- The Properties Editor- Editor Types- The User Preferences Editor- Overlays in the 3D View Editor- Scene Manipulation)
Unit-2 - Editors, Workspaces, Navigation 9 Hour
Editor Types- Resizing Editors- Splitting Editors- Cancel an Editor- Workspaces- Multiple Scenes- Files and Folders- Saving a File- Window File Explorer- Blender File Browser- Navigation- Editor Features- Make
a New Folder- Saving Your Work- The Concept of Files- The Append or Link Command- Importing Objects- Activating Import File Types- Packing Data
Unit-3 - Editing Tools 9 Hour
The Tool Panel- The Add Cube Tool- The Last Operator Panel- Extrusion- The Extrude Region Tool- Inset Faces- The Inset Faces Tool- The Bevel Tool- Edge and Loop Selection- The Loop Cut Tool- The Knife
Tool- The Poly Build Tool- The Spin Tool- Creating a Spin Profile- Spin Duplication- The Screw Tool- The Smooth Tool- The Edge Slide Tool- The Shrink Fatten Tool- The Rip Region Tool
Unit-4 - Animation 9 Hour
The Animation Screen- Movement in the 3D View Editor- Planning the Animation- Keyframes Time and Interpolation- Animation Speed and Length- Inserting Keyframes- Playing the Animation- Automatic Keyframing-
Controlling the Animation- The Graph Editor- Editing the Graph- Other Types of Curves- The Curve Properties Panel- Animating Rotation- Rotation Using F-Curves- Animating Other Features- Keying Sets- Animation
Follow Path- Displacement Sound Animation- Sound Effect and Cast Modifier.
Unit-5 - Physics and Simulation 9 Hour
Modifiers and Physics- Force Field- Collision Physics- Cloth Physics- Soft Body Physics¬- Fluid Simulation- Fluid Simulation Examples- Fluid Particles

435
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. The Complete Guide to Blender Graphics Computer Modeling & Animation CRC press 3. Game Graphics Programming by Allen Sharrod 2008 edition
Learning Fifth Edition by John.M. Blain,2019 4. Fundamentals of Construction and Simulation Game Design by Ernest Adams
Resources 2. Hands-On C++ Game Animation Programming: Learn Modern Animation Techniques 5. Simulation and Serious Games for Education Yiyu Cai, Sui Lin Goei, Wim Trooster 2016 Edition.
from Theory to Implementation with C++ and OpenGL by Gabor Szauer 2020 edition.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr Jai Naresh, South Region Head, 1. Dr M Kumaraesan Professor / CSE, Jain University 1. Dr.Monica Bhavani M , SRMIST
Media Entertainment Cell, and council
2. Mr Ajay Kumar, Consultant, Scopik edutech private limited.

436
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE441T MOBILE GAME DEVELOPMENT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the solid foundation in software engineering for mobile games 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand UNITY, C# and its tools and plugins

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: familiarize themselves with mobile usability and design concerns

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: implement several individual game project prototypes

Environment &
Sustainability
CLR-5: implement a larger, demo-able game project in a team environment

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the knowledge on the fundamentals of game development techniques 3 3 - - - - - - - - - - 1 - 1
CO-2: acquire the ability to apply the tools and plugins 3 2 - - - - - - - - - - 1 - 1
CO-3: utilize the design and mobile usability on various problems 3 2 - - - - - - - - - - 2 - 2
CO-4: acquire the ability to prototype the game project 3 2 - - - - - - - - - - 2 - 2
CO-5: apply the knowledge gained on larger game projects 2 2 - - - - - - - - - - 2 - 3

Unit-1 - Introduction 9 Hour


Game Design and Paper Prototyping - Game Analysis Frameworks - Inscribed Layer, Dynamic Layer - Cultural Layer, Design Goals - Paper Prototyping, Puzzle Design - The Digital Game Industry, Digital Prototyping
- Introducing Our Development Environment: Unity - Thinking in Digital Systems - Introducing Our Language: C# - Variables and Components - Boolean Operations and Conditionals - Lists and Arrays, Classes,
Functions and Parameters
Unit-2 - Game Objects 9 Hour
Basics of Game Development - Scenes, Objects, Components - Working with Unity 2D & 3D - 2D graphics, Camera - Sprites a Texture Atlases - Animation - Scrolling - Overview of vector math - Physics principles
- 3D math primer - Basics of 3D World, 3D rendering essentials - Using Unity for 3D development
Unit-3 - Game Interface 9 Hour
Mobile Game Input - Designing for Mobile - Basic Touch - Multi Touch Gestures - Accelerometer, Virtual joypads - Usability - Designing for the impatient gamer, Audio - Particle Effects - Alternate Game Development
Solutions - Cross-platform game engines - Platform specific game creation tools
Unit-4 - Game Prototype 9 Hour
Game Designing and Prototyping - MDA: Mechanics - Dynamics, Aesthetics - Formal, Dramatic - Dynamic Elements - The Elemental Tetrad - The Layered Tetrad - Artificial Intelligence, Tile maps - AI behavior -
Pathfinding - Augmented - Virtual Reality Games
Unit-5 - Advanced Graphics Development 9 Hour
Advanced Graphics - Native Development - Shaders on mobile - Advanced 3D effects - Plugins - Publishing - Advanced Deploying on the App Store - Software Engineering for Games - Game Architecture and
Implementation Patterns - Optimization - Pipelines and Tools - Profiling, Build Systems, Testing

437
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. John P. Doran, " Unity 2020 Mobile Game Development Discover Practical Techniques 3. Paris Buttfield-Addison, Jon Manning, Tim Nugent, " Unity Game Development Cookbook:
and Examples to Create and Deliver Engaging Games for Android and IOS", 2nd Edition, Essentials for Every Game” O’Reilly Media, 2019. ISBN: 9781491999127
Learning
Packt Publishing, 2020, ISBN: 9781838980993 4. Jeremy Gibson, "Introduction to Game Design, Prototyping, and Development: From Concept
Resources
2. Jonathon Manning, Paris Buttfield-Addison, "Mobile Game Development with Unity: Build to Playable Game with Unity and C#" ISBN-10:0321933168. 2014
Once, Deploy Anywhere", O'Reilly Media Inc., 2017 5. Sanjay Madhav, "Game Programming Algorithms and techniques", Addidon-Wesley, 2013

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Deepan Chakravarthy, Project Manager, Temnos 1. Dr.S.Muthuraj kumar, Associate Professor, Anna University 1. Dr. Anand M, SRMIST

438
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE442T GAME MONETIZATION TECHNIQUES E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic concepts of gaming in social life 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: analyze Industry terminologies, metrics in social games

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: apply game Users and Monetization model

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand Virtual Goods and Currency in game play

Environment &
Sustainability
CLR-5: analyze game Users and Monetization model

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify gaming concepts and social games 3 3 2 3 - - - - - - - - - - 2
CO-2: determine the Industry terminologies, metrics in social games 3 3 2 3 - - - - - - - - - - 2
CO-3: differentiate type of game Users and Monetization models 2 3 - 2 - - - - - - - - - - 2
CO-4: implement Virtual Goods in games and Currency in game play 3 3 1 3 - - - - - - - - - - 2
CO-5: apply game Feedbacks and AI Characters in game design 3 3 1 3 - - - - - - - - - - 2

Unit-1 - Introduction 9 Hour


The changing tide- What Is A Social Game- Are mobile games social- history of game monetization- what do we mean by monetization-a brief history of game monetization-the three grand eras of gaming- social
and mobile games put a lot of power in the hands of the developers-social games make the developer responsible- social games give power to the users-used retail game sales - Monetize your Game or App with
Ads
Unit-2 - Industry and Social Games 9 Hour
Industry Terms and Metrics- Measuring Player Population-Measuring Monetization- Social Network Advertising- Mobile Terms- General Terms- Why These Metrics Matter- Case Study: Ravenwood Fair And The
Use of Metrics In Game Design- Science of Social Game Design- Social Network: Make any Game Social- The Average Social Gamer- The Average- Mobile Gamer- Popular Social Networks Today- Games Are
Global- It’s All About Scale- Using Social Networks To Extend Traditional Games- Creating Social Networks As A Platform Holder - Monetize your Game or App with In-App Purchases
Unit-3 - Users and Monetization 9 Hour
Acquire, Keep and Regain Users: Build It So They’ll Come- The Purchase Funnel- Acquisition: How To Get Players- Acquiring New Users on Facebook- Acquiring New Users on Mobile Platforms- Advertising
Efficiently- The Rising Cost of CPI- Virality- Redirecting Users For Increased Virality- How to Retain Users- Tracking Retention- Using Leaderboards And Messaging To Add Stickiness- Using Messages To Remind
Users To Return- Only The Last Inch Matters-Monetization Strategies: Show Us The Money- Classic Premium Download Model- Subscriptions- Freemium- Play The Numbers- Combinations- Case Study: Hunters
Episode One And Different Monetization Methods - Avoid Giving Players Real Money- Transitioning Models - Which Models Fit Best For Which Type of Game - Make your first Downloads - Tips & Tricks
Unit-4 - Virtual Goods and Currency 9 Hour
Virtual Goods: fake estates- selling premium goods- functional advantages- game balance considerations- aesthetic “vanity” items- rarity Currency: Greenspan for the win- single currency models- dual currency
models- closed and open economies- addressing the matter of “honest” gameplay- Web 3 Gaming: Crypto- Play to Earn- NFT - Upload your Game or App on Google Play and Apple Store

439
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Feedbacks and AI Characters 9 Hour
Input and Feedback Mechanisms: Mouse And Keyboard- Controllers- Gestures- Eye Tracking As Input- Cameras- Drones- Finger Taps- More Advanced Anatomically Integrated Input- Thought Control- Speech-
Haptic Feedback-Displays- Glasses And VR Headsets Contacts And Retina Projection, Artificially Intelligent Characters :Virtual Characters Take over The World Soon-On AI Characters- Building AI Companions-
The Character Visuals- The Dialog- Text To Speech- Indistinguishable From Real Humans-Avatars- The Future of Avatars Artificial And Intelligent Characters - Motivating Players to Buy

1. Fields, Tim. Mobile & Social Game Design: Monetization Methods and Mechanics, Second 4. Advances in Human Factors in Wearable Technologies and Game Design:
Edition. United Kingdom, Taylor & Francis, 2014. Proceedings of the AHFE 2019 International Conference on Human Factors and
Learning 2. Fields, Tim. Game Development 2042: The Future of Game Design, Development, and Wearable Technologies, and the AHFE International Conference on Game Design
Resources Publishing. United Kingdom, CRC Press, 2022. and Virtual Environments, July 24-28, 2019, Washington D.C.,
3. Fields, Tim, and Cotton, Brandon. Social Game Design: Monetization Methods and USA. Germany, Springer International Publishing, 2019.
Mechanics. Netherlands, CRC Press, 2011.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr Jai Naresh, South Region Head, Media Entertainment Cell, and council 1. Dr M Kumaraesan Professor / CSE, Jain University 1. Dr P. Saravanan, SRMIST
2. Mr Ajay Kumar, Consultant, Scopik edutech private limited.

440
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE443T GAME PRODUCTION AND PUBLISHING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: recognize various steps involved in game production 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: explore the different kinds of prototyping in game production

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: introduce the game pitch and steps in process

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: elaborate the Developer and publisher overview in game publishing

Environment &
Sustainability
CLR-5: recognize the steps in testing and expose to various case studies in real time Game production

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: predict the trends in game development cycle 3 1 - - 3 - - - - - - - - - 1
CO-2: identify and apply various prototyping in Game development 2 2 - - 3 - - - - - - - - - -
CO-3: apply the process of pitching in game development - 2 3 - 3 - - - - - - - - 2 -
CO-4: design Game plan and Publishing - 3 - 2 3 - - - - - - - - - 2
CO-5: plan and produce their own video game in a conscientious manner - 2 3 2 3 - - - - - - - - - 2

Unit-1 - Introduction 9 Hour


Game production Overview-SWOT analysis-Production Cycle-Preproduction-Game Concept-Game Requirements-Game Plan—Production-Plan Implementation-tracking progress-Task Completion-Production
Checklist-Testing-Plan Validation-Code Release-Testing checklist-Post Production-Learn from experience-Archive plan-post production checklist--Different Roles on the Team
Unit-2 - Prototyping 9 Hour
Eight kinds of prototype-Paper Prototype-Physical Prototype-Playable prototype-Art and sound prototype-Interface Prototype-Code/Tech Prototypes-Core Game Prototypes-Complete Game Prototypes-Documenting
the prototypes.
Unit-3 - Pitching your Game 9 Hour
Preparing for the pitch-Elevator Pitch-Executive Summary-Demo-Trailer-Developer Backgrounds-Market Research-Production Plan-Making the pitch-Contract Negotiation-Vetting process
Unit-4 - Developer and Publisher Overview 9 Hour
Introduction-Function of Developer-Art-Design-Engineering-Audio-User Experience (UX)-Quality Assurance-Function of producer-Background and Training-Career Progression-Types of Producers-Function of
publisher-Background and Training- Career Progression-Types of Producers-Publishing your Game-Self Publishing-Publishing Partner-Publishing Relationship.
Unit-5 - Moving from Design to Production 9 Hour
Testing process-Informal Playtesting-Design process Testing-QA Testing-Automated Testing-Public facing testing-Case Studies-The Metagame-The Path-Johann Sebastian Joust-How to know when the design is
done-Getting Ready for production

441
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. A Playful Production Process: For Game Designers (and Everyone) by Richard 4. Games, Design and Play A Detailed Approach to Iterative Game Design By Colleen Macklin, John
Lemarchand, October 2021, MIT Press. Sharp, 2016, Addison-Wesley.
Learning
2. The Game Production Toolbox Paperback 2020, by Heather Chandler, CRC Press. 5. Fundamentals of Game Development by Heather Chandler, Rafael Chandler, August 2011, Jones
Resources
3. Introduction to Game Design, Prototyping, and Development: From Concept to & Bartlett Learning
Playable Game with Unity and C#, Jeremy Gibson Bond, 2017, Pearson Education.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr Jai Naresh, South Region Head, 1. Dr. Anbuchelian - Ramanujan Computing Center, Anna University 1. Ms.S. Sindhu, SRMIST
Media Entertainment Cell, and council
2. Mr Ajay Kumar, Consultant, Scopik edutech private limited.

442
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE444T APPLIED GAMIFICATION E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand game design principles and frameworks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: explain gamification in learning strategies

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: recognize gamification in Physiotherapy, sentiment analysis and recycling practice

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: design novel gamification approaches

Environment &
Sustainability
CLR-5: analyze problems on gamification and implementation

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify gamification principles and applications 1 2 2 - - - - - - - - - - - 2
CO-2: differentiate about various Learning Gamification Strategies 2 2 2 - - - - - - - - - - - 2
CO-3: analyze gamification in Physiotherapy, sentiment analysis and recycling practice 2 3 2 - - - - - - - - - - - 2
CO-4: determine novel gamification approaches - 3 2 - - - - - - - - - - - 2
CO-5: apply solution to problems on gamification and implementation - 3 3 1 - - - - - - - - - - 2

Unit-1 - Game Design Principles 9 Hour


Gamification Standardization: Gamification Frameworks- Gamification Systematic Study- Use of Gamification on Enterprises: Human Resource Management- Gamification In Human Resources- Gamification Applied
To Human Resources- Case Study: Genre Differences in Soft Skills Perception
Unit-2 - Learning Gamification Strategies 9 Hour
Strategy to Implement Gamification In LMS: Serious Games- Gamification of Learning- Pedagogical Approaches- Theories and Models- Serious Games in Learning Management Systems- Model for Structural
Gamification of Learning. Case Study: Gamification of E-Learning In African Universities- Theoretical Foundation And Hypothesis- Gamified Learning: Gamification Mechanisms- The Theory of Gamified Learning-
Studying The Influence of Gamification on Learning Outcomes- Solutions And Recommendations
Unit-3 - Serious Games and Apps 9 Hour
Game to Enhance Physiotherapy Student's Clinical Reasoning: Petrha+ Serious Game- Goals- Theoretical Framework- and Strategy-Establishing Physiotherapy Diagnosis- Using Sentiment Analytics to Understand
Learner Experiences: Enjoyment in Serious Game- Sentiment Analytics- Enjoyment Analytics Framework- Motivating Sustainable Recycling Practices: Gamified Recycling Applications- Technologies of Persuasion
and Application of Gamification Processes-Solution Conception and Game Logic
Unit-4 - Gamification Novel Approaches 9 Hour
Artificial Intelligence and Big Data Techniques to Enhance Gamified Financial Services: The Importance of Gamification- Fintech and Gamification- Gamified Healthcare Services and Devices: The Acceptance of
Technology- Healthcare and Gamification- Gamified Healthcare Wearable Technology- Augmented Reality Games: Augmented Reality and Gamification- Serious Games and Gamification- Augmented Reality in
the Gaming Industry-Game Transfer Phenomenon

443
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Gamification Mindset 9 Hour
Problems with Applying Gamified Thinking into a Product: Do You Need to Gamify? - Shallow Gamification- Do You Need to Be a Game Designer to Make a Gamification?- Games Are Cool Gamification Is Not-
Dull or Juicy Game Feel- Gamification Problems- Ethical Problems- Do Not Forget Algorithms and Big Data- How Can Real-Time Use of Gamification Drive Performance or Not?- Game Design Principles Usable
in Gamification: Game Thinking- Game Design Framework- Game Design Elements- Game Dynamics- Embedded Narrative- Emergent Narrative- Game Theory—And It’s Not Gamification- Game Theory as a Tree-
Game-Inspired Design- Game Player in a Wider Context

1. Filipe Portela, Ricardo Queirós, Next-Generation Applications and Implementations of Gamification 3. Transforming Society and Organizations Through Gamification: From the
Systems, IGI Globa, - 2022 Sustainable Development Goals to Inclusive Workplaces. Germany, Springer
Learning
2. Wells, Simon & Kotkanen, Henri & Schlafli, Michael & Gabrielli, Silvia & Masthoff, Judith & Jylhä, Antti & International Publishing, 2021.
Resources
Forbes, Paula. (2014). Towards an Applied Gamification Model for Tracking, Managing, & Encouraging 4. Ole Goeth, Gamification Mindset, springer, 20192.
Sustainable Travel Behaviours. ICST Transactions on Ambient Systems. 1. E2. 10.4108/amsys.1.4. e2.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr Jai Naresh, South Region Head, Media Entertainment Cell, and council 1. Dr M Kumaraesan Professor / CSE, Jain University 1. Dr P.Saravanan, SRMIST
2. Mr Ajay Kumar, Consultant, Scopik edutech private limited.

444
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE445T METAVERSE FUNDAMENTALS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: study the various application of metaverse 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: classify VR and AR possibilities in Metaverse

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: discover the challenges for implementation

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: identity the hardware and software for closely real time usage

Environment &
Sustainability
CLR-5: justify the possibilities of brain computing interface with the applications of VR

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: study about the Metaverse and Gaming 2 1 - - 3 2 - - - - - - - - -
CO-2: summarize the hardware and software possibilities 2 2 - - 3 2 - - - - - - - - 2
CO-3: review about the challenges in NFT 2 2 - - 3 2 - - - - - - - - -
CO-4: analyse the future of Metaverse 2 2 2 2 3 - - - - - - - - - -
CO-5: develop investments in metaverse 3 3 3 2 3 - - - - - - - - - 3

Unit-1 - Introduction to Metaverse 9 Hour


Introduction to Metaverse - Rise of Metaverse - Future of Metaverse - Meta - Microsoft - Epic Games - Roblox - Minecraft - Milestones of Metaverse – ramifications- Various applications in Metaverse
Unit-2 - Virtual Reality and Augmented Reality in Metaverse 9 Hour
VR in Metaverse - Recruitment - Coordination - New Target - Preparation for virtual Reality - AR updates via spark - Ecommerce using Augmented Reality - AR in Military - Ubiquitous Computing - AR and VR in
Metaverse
Unit-3 - NFT’s In the Metaverse 9 Hour
Introduction to NFT - NFT’s effect on Metaverse - NFT’s Becoming identity in Metaverse - Avoid Risk and Challenges in Metaverse - Legal Ramifications - Data exchange - AI Regulation- NFT and Metaverse
Unit-4 - The Future of Metaverse 9 Hour
Current states of metaverse market - Shopping and Business - Education - Advertising - Healthcare -, Workplace and Office - Entertainment and Media - Revive History - Social Experience - Enterprise activities-
The future of Metaverse
Unit-5 - Metaverse Investments 9 Hour
Relationship with Crypto - Top crypto and metaverse projects - NFT Games - Virtual real estate - NFT impact on Metaverse - Virtual real estate trend, Physical and virtual real estate – Cryptocurrencies- Metaverse
in enterprises

445
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Metaverse for Beginners -A Guide to Help You Learn About Metaverse, Virtual Reality and Investing In 4. Jesse Glover, Jonathan Linowes – Complete Virtual Reality and Augmented Reality
NFTs, Andrew Clemens (2022). Development with Unity: Leverage the power of Unity and become a pro at creating
2. Jesse Glover, Jonathan Linowes – Complete Virtual Reality and Augmented Reality Development with mixed reality applications. Packt publishing, 17th April 2019. ISBN -13: 978-
Learning Unity: Leverage the power of Unity and become a pro at creating mixed reality applications. Packt 1838648183
Resources publishing, 17th April 2019. ISBN -13: 978-1838648183 5. Jonathan Linowes, Krystian Babilinski – Augmented Reality for Developers: Build
3. Jonathan Linowes, Krystian Babilinski – Augmented Reality for Developers: Build practical augmented practical augmented reality applications with Unity, ARCore, ARKit, and Vuforia.
reality applications with Unity, ARCore, ARKit, and Vuforia. Packt publishing, 9th October 2017. ISBN- Packt publishing, 9th October 2017. ISBN-13: 978-1787286436
13: 978-1787286436), “Retail Analytics: The Secret Weapon”, Wiley, ISBN- 978-1-118-09984-1

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Ravikumar, CEO at Hackwit Technologies Pvt Ltd, 1. Prof. Indrakishor, Department of Computer Science and Engineering, 1. Dr. R. Rajkumar, SRMIST
Chennai. Poornima Institute of Engineering & Technology, Jaipur, Rajasthan.

446
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE446T DIGITAL MARKETING AND PUBLISHING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the various digital marketing platforms 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: practice the tools available for creating an effective digital marketing strategy

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: explain technical skills to design and develop an integrated digital marketing plan for an organization

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: highlight the publishing strategies and key issue agreements in game Industry

Environment &
Sustainability
CLR-5: develop entertaining and intuitive experiences for emerging platforms

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the role of digital marketing in marketing strategy - - - - - 2 - - 3 2 - - - - -
CO-2: identify the key elements of a digital marketing strategy 2 - 3 - - 2 - - - - - - - - -
CO-3: analyze the role that social marketing plays in the digital marketing 2 - - - - 3 - - - - - - - - -
CO-4: explore the structure, methods, and key issues in games industry 2 - - 2 - - - - - - - - - - 2
CO-5: create and publishing of a game - - 3 - - 2 - - - 3 - - - - 3

Unit-1 - Introduction to Digital Marketing 9 Hour


Introduction to Digital Marketing: Introduction - Original and Development of Digital Marketing - Internet Users: Penetration and Kind of Internet Use - Digital Marketing strategy – Digital Advertising Marketing Plan -
Ethical and legal of framework of Digital Marketing - Skills Required in Digital Marketing - Digital Advertising: Introduction - Concept of display advertising - Digital Metrics - Types of Digital Ad - Targeting in digital
marketing - Challenges faced by display marketing
Unit-2 - Marketing Strategies 9 Hour
Search Engine Advertising: Introduction – Why pay for search advertising? – Understanding Ad Placement – Understanding Ad Ranks – Why is the Ad rank important? – Create your first Ad Campaign – Google
Ads Account – Best practices for creating effective Ads - Enhance your Ad Campaign – Performance Reports – E-Commerce Social Media Marketing -Introduction - Strategy - Implementation - Measure - Improve
- Social Entertainment - Different forms of social entertainment – Gamification
Unit-3 - Social Media Marketing Strategies 9 Hour
Face book Marketing: Introduction – Organic Marketing – Paid Marketing – Facebook Insights LinkedIn: Introduction - LinkedIn Strategy - Content Strategy - LinkedIn Native Videos - LinkedIn Analytics - Asset
Copying - LinkedIn Sales Navigator – Ad-campaign - Emerging Platforms: Instagram – Pinterest
Unit-4 - Publishing and Legal Agreement 9 Hour
Game publishing-Introduction-overview of Indie PC and console market-types of publishers-, publishing strategies, Game publishing agreement-Publisher's Objectives-Developer's objectives- Key legal issues in
game publishing agreement
Unit-5 - Case Study 9 Hour
case study - Business process-promoting games-Case studies-practical and Ethical Concerns in usability testing with children- Usability testing of a Three -Dimensional library Orientation Game

447
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Kevin Hartman Digital Marketing Analytics: In Theory and In Practice Ostmen Bennett 3. Simon Kingsnorth Digital Marketing Strategy: An Integrated Approach to Online Marketing 2nd
Learning Bridge Publishing Services 2nd Edition, 2020 Edition Kogan Page 2nd Edition, 2019.
Resources 2. The Publishing Challenge for Independent Video Game Developers A Practical Guide 4. Seema Gupta Digital Marketing McGraw Hill Education 2 nd Edition, 2018
By Odile Limpach 2020 5. Games User Research A Case Study Approach 2017, CRC Press

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 15% - - -
Level 6 Create - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr Jai Naresh, South Region Head, Media Entertainment Cell, and council 1. Dr.Selvakumar,NIT Trichy 1. Dr.G.Divya, SRMIST
2. Mr Ajay Kumar, Consultant, Scopik edutech private limited.

448
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

UNDERGRADUATE/ INTEGRATED POST


GRADUATE DEGREE PROGRAMMES
(With exit option of Diploma)

(Choice Based Flexible Credit System)

Regulations 2021

Volume – 11K
(Syllabi for Computer Science and Engineering w/s in
Big Data Analytics and Data Science Programme Courses)

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

449
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Engineering Science Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

450
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSS202T FUNDAMENTALS OF DATA SCIENCE S ENGINEERING SCIENCES
Code Name Category 3 2 0 5

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the different data structures and their packages in Python 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: know to create functions to access and manipulate numbers, strings and datetime data

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: utilize the Numpy library to analyse numbers

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn the Pandas library to analyse data frames

Environment &
Sustainability
CLR-5: explore the visualization tools for different kinds of input data formats

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: distinguish the different data structures using the various packages - 1 - - - - - - - - - - 1 1 -
CO-2: create functions to access and manipulate numbers, strings and datetime data - 2 - - - - - - - - - - 1 1 -
CO-3: implement the code for numbers using Numpy - 3 - - - - - - - - - - 1 1 -
CO-4: develop code for data frames using Pandas - 3 - - - - - - - - - - 1 1 -
CO-5: visualize different kinds of data using matplotlib and seaborn - 2 - - - - - - - - - - 1 1 -

Unit-1 - Introduction to Data Science 15 Hour


Benefits and uses of Data science, Facets of data, The data science process-Introduction to Python Libraries: Numpy, creating array, attributes, Numpy Arrays objects: Creating Arrays, basic operations (Array Join,
split, search, sort), Indexing, Slicing and iterating, copying arrays, Arrays shape manipulation, Identity array, eye function, Universal function, Linear algebra with Numpy, eigen values and eigen vectors with NumPy,
NumPy Random: Data Distribution, Normal, Exponential, Binomial, Poisson, Uniform and Chi-square distributions.
T1: Using Numpy implement Array Indexing and slicing, T2: Using Numpy implement Array basic operations, T3: Using Numpy implement Linear algebra and Random package
Unit-2 - Introduction to Python Debugging 15 Hour
Debug python scripts using PDB and IDE, Classify Errors, Develop Unit Tests , Create project Skeletons, Implement Database using SQLite, Perform CRUD operations, SQLite database, JSON file – Read,
Write and Parse JSON file - JSON Conversion – to dictionary, to JSON, to JSON String, JSON schema – Schema Validation, Resolving JSON Reference, Extending Validator Classes - Virtual Environment,
Floating point Arithmetic – Issues and Limitations, Implement Regular Expression and its Basic Functions - findall(),search(),split(),sub(),Use Classes, Objects, and Attributes, Develop applications based on Object
Oriented Programming and Methods.
T4: Implement programs to handle JSON files, T5: Implement programs to work with Regex functions and classes, T6: Implementing Debugging and creating projects in python IDE
Unit-3 - Introduction to Python 15 Hour
Django Web Framework: Web development basics and Features of Django, Installing Django and MVC model , HTTP webserver concepts - Use HTTP request and response objects, Create Views, Use URLConf
- URL Mapping, Introduction to Django Template System, Load Template Files, Render Templates, Create Forms, Process Form Data and Customize Form Field Validation, Introduction to Django Models, Use
Model Fields, populate a Database, CRUD, Use QuerySets for data retrieval, Use jQuery and AJAX with Django to create Dynamic websites
T7: Implement Django framework using python – creating basic Django App, T8: Create a simple View using Django, T9: Implement Django app for real-time applications using MVC model

451
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Handling Data 15 Hour
Problem faced when handling large data-General techniques for handling large volume of data- General programming tips for dealing large data sets Introduction to Pandas, Data Structure in pandas – dataframe
and series, Accessing and slicing of series and dataframes - Arithmetic and logical operations on dataframe, Accessing and slicing of series, And dataframes - Arithmetic and logical operations on dataframe,
Groupby operations on Dataframe, Pivot tables to understand the relationship between variables in the data, with different aggregation-Crosstab to understand the relationship between variables in the data, Handling
missing data – Time series – date functionality, Time delta Vectorization concept implementation using pandas – I/O tools of Pandas, Indexing, multi indexing concepts - Application. Data handling – Categorical
data, Integer data. Computational tools – Statistical functions, windowing operations, Chart and Table Visualization in Pandas.
T10: Building programs to access the csv files as a dataframe and analyze the dataframe, T11: Perform different arithmetic, logical, and filtering operations on dataframes
T12: Perform group by, pivot and crosstab aggregation on the dataframes
Unit-5 - Visualization 15 Hour
Advantages and usecases, working with Matplotlib to plot different visuals, Working with Seaborn to plot different visuals, Univariate graphs for numeric and categorical data, Bivariate graphs for numeric and
categorical data, Multivariate Graphs, Choosing appropriate graphical techniques, using graph to explore the data insights, Introduction to dashboards.
T13: Building programs to visualize the dataframe in matplotlib and seaborn, T14: Building programs to visualize the univariate, bivariate and multivariate relation
T15: Case study with all the appropriate graphs to visualize the relationship in the data

1. Grus, J. (2019). Data Science from Scratch, 2nd Edition. O'Reilly Media, Inc. 5. Magnus Lie Hetland, “Beginning Python: From Novice to Professional”, Apress, Second Edition,
2. Davy Cielen, Arno Meysman, Mohamed Ali – Introducing Data Science: Big Data, 2005.
Machine Learning, and, more, using Python tools, ManningPublications,2016 6. Shai Vaingast, “Beginning Python Visualization Crafting Visual Transformation Scripts”, Apress,
Learning
3. McKinney, W. (2018). Python for data analysis: Data wrangling with pandas, NumPy, 2nd edition, 2014.
Resources
and IPython. O'Reilly Media, Inc. 7. Wes Mc Kinney, “Python for Data Analysis”, O'Reilly Media, 2012.
4. Vanderplas, J. T. (2017). Python data science handbook: Essential tools for working 8. Wesley J.Chun,”Core Python Applications Programming,3rd ed,Pearson,2016
with data. O'Reilly Media, Inc.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. A.G.Rangaraj,Deputy Director (Technical),R&D, RDAF and 1. .Dr.I.Joe Louis Paul, Associate Professor, SSN College of Engineering 1. Dr.G.Vadivu, SRMIST
SRRA Division, National Institute of Wind Energy (NIWE)

452
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSS301T FULL STACK DEVELOPMENT S ENGINEERING SCIENCES
Code Name Category 1 1 0 2

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the basics of JavaScript and importance of MERN stack 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: learn the role of React in designing front-end components

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the design issues in the development of backend components using Node.js and Express

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn the significance of using MongoDB as a database system

Environment &
Sustainability
CLR-5: explore the advanced features of full stack development

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: setting up MERN environment for node.js - - - - - - - - - - - - 1 - -
CO-2: apply the knowledge of react based web programming - - - - - - - - - - - - - - 1
CO-3: deal with Node based programming and Express - - - - - - - - - - - - 2 - -
CO-4: analyze Express based web development - - - - - - - - - - - - - 1 -
CO-5: create a Mongodatabase for DDL commands - - - - - - - - - - - - - - 2

Unit-1 – Basics of MERN Stack 10 Hour


MERN Introduction-MERN Components - React - Node.js - Express - MongoDB - Need for MERN - Server-Less Hello World - Server Setup - nvm - Node.js npm. MongoDB - MongoDB Basics - Documents -
Collections - Query Language - Installation - The mongo Shell - Schema Initialization - MongoDB Node.js Driver - Reading from MongoDB - Writing to MongoDB
Tutorial:
 Setting up MERN environment
 Simple programs in MERN environment
 Setting up MongoDB and handling data manipulation
Unit-2 - React 10 Hour
React Introduction - React ES6 - React Render HTML - React JSX - Components -React Classes - Composing Components - Passing Data - Dynamic Composition - React state - setting State - Async State
Initialization - Event Handling Communicating from Child to Parent - Stateless Components - Designing components- React Forms - React CSS - React SaaS
Tutorial:
 REACT based programming
 Exploring stateless components

453
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-3 - Node.JS and Express 10 Hour
Node.js basics - Local and Export Modules - Node Package Manager - Node.js web server - Node.js File system - Node Inspector - Node.js Event Emitter - Frameworks for Node.js. Express.js Web App - Serving
static Resource - Node.js Data Access - Express REST APIs - REST - Resource Based - HTTP Methods as Actions - JSON- Express - Routing - Handler Function – Middleware-Rest API
Tutorial:
1. Node based web development Handling of various APIs associated with Node.js
2. Express based web development Handling of various APIs associated with Node.js
Mini Project (Tentative Title):
1. E-commerce Website
2. Food Delivery App
3. Social Media App
4. Chat Messaging App
5. Content Management System
6. Blog Site
7. Workout Tracker App
8. Project Management Dashboard

1. Pro MERN Stack, Full Stack Web App Development with Mongo, Express, React, and Node, 3. Mardan, A. (2014). Express. js Guide: The Comprehensive Book on Express. js. Azat
Learning Vasan Subramanian, A Press Publisher, 2019. Mardan.
Resources 2. Bradshaw, S., Brazil, E., & Chodorow, K. (2019). MongoDB: the definitive guide: powerful and
scalable data storage. O'Reilly Media.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.P.Kanmani, SRMIST

454
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Core Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

455
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC206P ADVANCED OBJECT ORIENTED PROGRAMMING C PROFESSIONAL CORE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: explore JAVA compiler and build domain model for real-time programs 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: apply the OOP concepts in JAVA programs

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: utilize interfaces and packages in java applications

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: develop java applications using collection interface and Array list class with exception handling

Environment &
Sustainability
CLR-5: design applications using Graphical User Interfaces and explore JDBC

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: infer the concepts of Object-Oriented Programming with JAVA - 1 - - - - - - - - - - - - -
CO-2: construct programs using Class and Inheritance - 2 - - - - - - - - - - - - -
CO-3: create interface and package in java programs - 3 - - - - - - - - - - - - -
CO-4: apply collection interface and Array list class in programs and explore multithreading - 3 - - - - - - - - - - - - -
CO-5: design and build simple Graphical User Interfaces and execute queries to store and retrieve data in database - 3 - - - - - - - - - - - - -

Unit-1 - Introduction to Java 9 Hour


Java programming Environment and Runtime Environment, Development Platforms -Standard, Enterprise. Java Virtual Machine (JVM), Java compiler, Bytecode, Java applet, Java Buzzwords, Java program
structure, Comments, Garbage Collection, Lexical Issues. Primitive Data types -Type Conversion and Casting, Variables, Arrays, Strings, Vector class. -Operators -Control Statements-- Selection Statements,
Iteration Statements and Jump Statements.
Tutorial:
1. Simple JAVA program using control structures, arrays, and Vector Class
2. Sum of series (1 + 2+ 3+…...n,1+1/2+1/3 +……..1/n,12 + 22+ 32 +…….n2)
Unit-2 - Object Oriented Programming in Java 9 Hour
Class Fundamentals, Declaring Objects, Object Reference, Introduction to Methods, Constructors, this Keyword, Method Overloading, Using Objects as Parameters, Returning Objects, Recursion, Access Control,
Static Members, Final Variables, Inner Classes, Command Line Arguments, Variable Length Arguments. Inheritance - Super Class, Sub Class, The Keyword super, protected Members, Calling Order of Constructors,
Method Overriding, the Object class, Abstract Classes, and Methods, using final with Inheritance.
Tutorial:
1. Create Bank class with suitable methods to create objects as account holders
2. Program with static members and final variable

456
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-3 - Packages and Interfaces 9 Hour
Defining Package, CLASSPATH, Access Protection, Importing Packages, Interfaces. Exception Handling - Checked Exceptions, Unchecked Exceptions, try Block and catch Clause, Multiple catch clauses, Nested
try Statements, throw, throws and finally Input/Output - I/O Basics, Reading Console Input, Writing Console Output, Print Writer Class, Object Streams and Serialization, Working with Files.
Tutorial:
1. Create and interface and implement it in a class
2. Create a package and import it in multiple classes
Unit-4 - Java Library 9 Hour
String Handling – String Constructors, String Length, Special String Operations -Character Extraction, String Comparison, Searching Strings, Modifying Strings, using valueOf(), Comparison of StringBuffer and
String.Collections framework - Collections overview, Collections Interfaces- Collection Interface, List Interface. Collections Class – ArrayList class. Accessing a Collection via an Iterator. Event handling - Event
Handling Mechanisms, Delegation Event Model, Event Classes, Sources of Events, Event Listener Interfaces, Using the Delegation Model.Multithreaded Programming - The Java Thread Model, The Main Thread,
Creating Thread, Creating Multiple Threads, Synchronization, Suspending, Resuming and Stopping Threads.
Tutorial:
1. Programs using Collection Interface and ArrayList Class
2. Programs to implement event handling and exception handling
Unit-5 - Swings Fundamentals 9 Hour
Swing Key Features, Model View Controller (MVC), Swing Controls, Components and Containers, Swing Packages, Event Handling in Swings, Swing Layout Managers, Exploring Swings –JFrame, JLabel, The
Swing Buttons, and JTextField. Java Data Base Connectivity (JDBC) - JDBC overview, Creating and Executing Queries – create table, delete, insert, select.
Tutorial:
1. Form Design with Swing
2. Program with Java Data Base Connectivity (JDBC)

1. Herbert Schildt, Java: The Complete Reference, 8/e, Tata McGraw Hill, 2011. 4. Y. Daniel Liang, Introduction to Java Programming, 7/e, Pearson, 2013.
Learning
2. Rajib Mall, Fundamentals of Software Engineering, 4th edition, PHI, 2014. 5. Nageswararao R., Core Java: An Integrated Approach, Dreamtech Press, 2008.
Resources
3. Paul Deitel, Harvey Deitel, Java How to Program, Early Objects 11th Edition, Pearson, 2018.

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Project Based Learning Report and Viva Voce Final Examination
Bloom’s
CLA-1 Average of unit test CLA-2 (20% weightage) (0% weightage)
Level of Thinking
(20%) (60%)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - - 20% - 40% - -
Level 2 Understand 40% - - 20% - 40% - -
Level 3 Apply 10% - - 20% - 10% - -
Level 4 Analyze 10% - - 20% - 10% - -
Level 5 Evaluate - - - 10% - - - -
Level 6 Create - - - 10% - - - -
Total 100 % 100 % 100% -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Harisekharan, Praya AI Lab 1. Dr.Paul T Sheeba, SRMIST
2. Dr.T.Karthick, SRMIST

457
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC307P MACHINE LEARNING FOR DATA ANALYTICS C PROFESSIONAL CORE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understanding Human learning aspects 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquaintance with primitives in the learning process by computer

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: develop the linear learning models and classification in machine learning

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: implement the clustering techniques and their utilization in machine learning

Environment &
Sustainability
CLR-5: implement the tree-based machine learning techniques and to appreciate their capability

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
demonstrate knowledge of learning algorithms and concept learning through implementation for sustainable
CO-1: - - - - - - - - - - - - 1 - -
solutions of applications
evaluation of different algorithms on well formulated problems along with stating Valid conclusions that the
CO-2: - - - - - - - - - - - - - 2 -
evaluation supports
formulate a given problem within the Bayesian learning framework with focus on Building lifelong learning
CO-3: - - - - - - - - - - - - - - 2
ability
analyze research-based problems using Machine learning techniques and apply different clustering
CO-4: - - - - - - - - - - - - 2 - -
algorithms used in machine learning to generic datasets and Specific multidisciplinary domains
CO-5: evaluate decision tree learning algorithms - - - - - - - - - - - - - - 1

Unit-1 - Introduction and Types of Learning 9 Hour


Introduction: Machine Learning: What & Why? - Examples of Machine Learning applications, Training versus Testing, Positive and Negative Class, Cross-validation. Types of Learning: Supervised, Unsupervised
and Semi-Supervised Learning. The Curse of dimensionality-Over fitting and under fitting-Linear regression-Bias and Variance Tradeoff-Regularization-Learning Curve-Classification-Error and noise-Parametric vs.
non-parametric models-Linear Algebra for machine learning
T1: Building programs to work with the data pre-processing in python, T2: Building programs to work with linear regression in python, T3: Building programs to work with cross validation in Python
Unit-2 - Design and Analysis of Machine Learning Algorithms 9 Hour
Guidelines for machine learning experiments, Cross Validation (CV) and resampling – K-fold CV, bootstrapping, measuring classifier performance, assessing a single classification algorithm, and comparing two
classification algorithms – t test, McNemar’s test, K-fold CV paired t test Performance metrics-MSE, accuracy, confusion matrix, precision, recall, F1- score-Linear Regression with multiple variables-Logistic
Regression-spam filtering with logistic regression
T4: Building programs to performance metrics in python, T5: Building programs work with linear regression with multiple variables in Python, T6: Building programs work with logistic regression in python
Unit-3 - Distance Based Models 9 Hour
Ridge Regression-Maximum likelihood estimation (least squares)- Principal component analysis- K nearest neighbour classification –Gaussian Naive Bayes Classification-Multinomial Naïve Bayes classification-
Bernoulli Naïve Bayes Classification-Comparison of Gaussian, Multinomial, Bernoulli naive bayes classification -Support vector machine-Support vector machine + kernels-Multi class classification- -Application:
face recognition with PCA.
T7: Building python programs to use principal component analysis, T8: Building python programs to use Naïve Bayes classification, T9: Building programs to use Support Vector Machine

458
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Clustering Techniques 9 Hour
Measuring (dis)similarity-Evaluating output of clustering methods-Spectral Clustering-Hierarchical Clustering-Agglomerative Clustering-Divisive Clustering-Choosing the number of clusters-Clustering data points
and features-Bi-clustering-multi-view clustering-K-Means clustering-K-medoids clustering-Application: image segmentation using K-means clustering
T10: Building programs to implement Hierarchical clustering , T11: Building programs to implement K-Means clustering, T12: Building programs to perform cluster evaluation
Unit-5 - Tree Based Models 9 Hour
Decision tree representation-Basic decision tree learning algorithm-Inductive bias in decision tree Decision tree construction-Issues in decision tree-Classification and regression trees (CART)- Random Forest-
Random Forest with scikit-learn Minority Class, Impurity Measures – Gini Index and Entropy, BestSplit -Multivariate adaptive regression trees (MART)-
Introduction to Artificial Neural Networks-Perceptron learning
T13: Building programs to implement decision tree algorithm, T14: Building programs to implement random forest algorithm , T15: Building programs to implement Artificial Neural Networks

1. Ethem Alpaydin, “Introduction to Machine Learning”, MIT Press, Fourth Edition, 2020. 4. Tom Mitchell, "Machine Learning", McGraw-Hill, 1997. Sebastian Raschka, Vahid
2. Stephen Marsland, “Machine Learning: An Algorithmic Perspective, “Second Edition”, Mirjilili,ǁPython Machine Learning and deep learningǁ, 2nd edition, kindle book, 2018
Learning
CRC Press, 2014. 5. Carol Quadros, ǁMachine Learning with python, scikit-learn and Tensorflowǁ, Packet
Resources
3. Kevin P. Murphy, ―Machine learning: A Probabilistic Perspectiveǁ, MIT Press, 2012. Publishing, 2018.
6. Gavin Hackeling, ǁ Machine Learning with scikit-learnǁ, Packet publishing, O‘Reily, 2018.

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Project Based Learning Report and Viva Voce Final Examination
Bloom’s
CLA-1 Average of unit test CLA-2 (20% weightage) (0% weightage)
Level of Thinking
(20%) (60%)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% - 15% - -
Level 2 Understand 25% - - 20% - 25% - -
Level 3 Apply 30% - - 25% - 30% - -
Level 4 Analyze 30% - - 25% - 30% - -
Level 5 Evaluate - - - 10% - - - -
Level 6 Create - - - 5% - - - -
Total 100 % 100 % 100 % -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. E Nagarajan, R&D Head, Solvedge Technology 1. Dr. Anandhakumar P Professor, Madras Institute of Technology, Chrompet 1. Dr.M.Lakshmi, SRMIST
2. Dr.Shobanadevi, SRMIST

459
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Elective Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

460
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE222T BIG DATA TOOLS AND TECHNIQUES E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: gain knowledge about the various tools and techniques used in big data analytics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: learn the fundamentals of Hadoop and the related technologies

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the basics of development of applications using MapReduce, HDFS, YARN

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn the basics of Pig, Hive and Sqoop

Environment &
Sustainability
CLR-5: learn the basics of Apache Spark, Flink and understand the importance of NoSQL databases

solutions

society

PSO-1

PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: use the various tools and techniques in big data analytics - - - - 1 - - - - - - - - - -
CO-2: apply Hadoop and related technologies to big data analytics - - - - 1 - - - - - - - 1 - -
CO-3: apply MapReduce, HDFS and YARN develop big data applications - - - - 1 - - - - - - - 1 - -
CO-4: develop applications using Pig, Hive and Sqoop - - - - 1 - - - - - - - 1 - -
CO-5: apply Apache Spark and Flink to applications and understand the importance of NoSQL databases - - - - 1 - - - - - - - 1 - -

Unit-1 - Overview of Big Data Analytics 9 Hour


Introduction to data analytics and big data-Big data mining-Technical elements of the Big Data platform, Analytics Toolkit, Components of the analytics toolkit -Distributed and Parallel Computing for Big Data-Cloud
computing and Big Data-In-Memory Computing Technology for Big Data-Fundamentals of Hadoop-Hadoop Ecosystem-The core modules of Hadoop-Introduction to Hadoop MapReduce-Introduction to Hadoop
YARN.
Unit-2 – Big Data Frame Work 9 Hour
MapReduce-Analyzing data with Unix tools and Hadoop-Scaling Out – Data Flow, Combiner Functions-Hadoop Streaming-HDFS-Hadoop filesystems-Java Interface to Hadoop-YARN-Job Scheduling-Hadoop I/O-
Data Integrity-Compression-Serialization-File based Data Structures-Developing a MapReduce Application.
Unit-3 – Big Data Ecosystem 9 Hour
Setting up a Hadoop Cluster-Cluster specification and setup-Hadoop configuration-YARN configuration-Introduction to Pig-Installing and running pig-Basics Pig Latin -Example Programs-Introduction to Hive-
Installing and running Hive-Introduction to HiveQL-Create-Drop-Alter-order by-Group by-Joins-Introduction to Zookeeper-Installing and running Zookeeper-Creating different types of Znodes-Flume Architecture-
Introduction to Sqoop.
Unit-4 – Database in Big Data Framework 9 Hour
Introducing Oozie-Apache Spark-Limitations of Hadoop and overcoming the Limitations-Core components and architecture of Spark-Introduction to Apache Flink-Installing Flink-Batch analytics using Flink-Big
Data Mining with NoSQL-Why NoSQL? -NoSQL databases-Introduction to MongoDB,-Basi queries in MongoDB-Introduction to Cassandra.
Unit-5 – Visualization 9 Hour
Enterprise Data Science Overview-Data Science Solutions in the enterprise-Enterprise data science – Machine Learning and AI-Enterprise Infrastructure Solutions-Visualizing Big Data-Using Python and R for
visualization-Big Data Visualization Tools-Data Visualization with Tableau-Case Studies: Hadoop-Case Studies: Spark-Case Studies: NoSQL.

461
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Herbert Schildt, ‘C++ - T Bjarne Stroustrup, ‘The C++ Programming Language’, Addison 4. Kris Jasma, ‘Java Programming – A Complete Reference’, Galgotia publication, 1994.
Learning Wesley, 2000. 5. Cay S. Horstmann, Gary cornell, ―Core Java Volume –I Fundamentalsǁ, 9th Edition,
Resources 2. The Complete Reference’, Tata McGraw Hill, 1997. Prentice Hall, 2013.
3. Herbert Schildt, ―Java The complete referenceǁ, 8th Edition, McGraw Hill Education, 2011

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 50% - 50% - 50% -
Level 2 Understand 50% - 50% - 50% -
Level 3 Apply - - - - - -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.R. SivaKumar,Sr. Consultant,[email protected] 1. Dr.S Muthurajkumar, Asst. Professor, Department of Computer 1. Mrs.S.Sindhu, SRMIST
A2O Integrated services Pvt., Ltd., Chennai Technology, [email protected], MIT Campus, Anna University,
Chromepet, Chennai-600044.

462
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE224T COMPUTER ARCHITECTURE E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the Fundamentals of computers, Memory operations and Addressing Modes 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: know about Functions of Arithmetic and Logic unit

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: explore the Operations of Control Unit, Execution of Instruction and Pipelining

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: classify the Need for Parallelism, Multicore and Multiprocessor Systems

Environment &
Sustainability
CLR-5: understand the Concepts and functions of Memory unit, I/O unit

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify the computer hardware and how software interacts with computer hardware 2 1 1 - - - - - - - - - - - -
apply Boolean algebra as related to designing computer logic, through simple combinational and
CO-2: 2 2 1 - - - - - - - - - - - -
sequential logic circuits
CO-3: examine the detailed operation of Basic Processing units and the performance of Pipelining 2 3 1 - - - - - - - - - - - -
CO-4: analyze concepts of parallelism and multi-core processors 2 3 1 - - - - - - - - - - - -
CO-5: classify the memory technologies, input-output systems and evaluate the performance of memory system 2 2 1 - - - - - - - - - - - -

Unit-1 - Introduction to Number System and Logic Gates 9 Hour


Number Systems- Binary, Decimal, Octal, Hexadecimal; Codes- Grey, BCD, Excess-3, ASCII, Parity; Binary Arithmetic- Addition, Subtraction, Multiplication, Division using Sign Magnitude,1’s compliment, 2’s
compliment, BCD Arithmetic; Logic Gates-AND, OR, NOT, NAND, NOR, EX-OR, EX-NOR.
Unit-2 - Basic Structure of Computers 9 Hour
Functional Units of a computer, Operational concepts, Bus structures, Memory addresses and operations, assembly language, Instructions, Instruction sequencing, Addressing modes. Case study: 8086. Design of
ALU: De Morgan’s Theorem, Adders, Multiplier – Unsigned, Signed, Fast, Carry Save Addition of summands; Division–Restoring and Non-Restoring; IEEE 754 Floating point numbers and operations.
Unit 3 - Control Unit 9 Hour
Basic processing unit, ALU operations, Instruction execution, Branch instruction, Multiple bus organization, Hardwired control, Generation of control signals, Micro-programmed control; Pipelining: Basic concepts of
pipelining, Performance, Hazards-Data, Instruction and Control, Influence on instruction sets
Unit-4 - Types of Memories 9 Hour
Need for a hierarchical memory system – Cache memories– Memory Mapping – Improving Cache Performance – Virtual Memory – Memory Management Techniques – Accessing I/O devices – Programmed
Input/output – Interrupts – Direct Memory Access.
Unit-5 - Parallelism 9 Hour
Need, types, applications & challenges, Architecture of Parallel Systems-Flynn’s classification – Optimization techniques for Parallel Structures; ARM Processor: The thumb instruction set, Processor and CPU cores,
Instruction Encoding format, Memory load and Store instruction, Basics of I/O operations. Case study: ARM 5 ,ARM 7 and ARM Neon Architecture

463
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Carl Hamacher, ZvonkoVranesic, SafwatZaky, Computer Organization,5thed., McGraw- 5. William Stallings, Computer Organization and Architecture–Designing for
Hill, 2015 Performance,10thed.,Pearson Education,2015
Learning 2. KaiHwang, FayeA.Briggs, Computer Architecture and Parallel Processing”,3rd ed. 6. DavidA.Patterson and JohnL. Hennessy Computer Organization and Design-A Hardware
Resources McGraw Hill, 2016 software interface,5thed.,Morgan Kaufmann,2014
3. GhoshT.K.,Computer Organization and Architecture,3rded.,TataMcGraw-Hill,2011 7. Neon – Arm®https://www.arm.com › technologies › neon
4. P.Hayes, Computer Architecture and Organization,3rded.,McGrawHill,2015. 8. Neon - Arm Developerhttps://developer.arm.com › Architectures › Neon

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr S.Janakiraman, Pondicherry University 1. Dr M.Lakshmi, SRMIST
2. Dr P.Thiyagarajan, Rajiv Gandhi National Institute of Youth Development 2. Dr G Vadivu, SRMIST

464
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE321T DATA WAREHOUSING AND DATA MINING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce the concepts of Data Warehousing, difference between database and data warehousing 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: describe OLAP Model and the Star Schema to design a Data Warehouse

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: introduce data mining principles and techniques

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: introduce data mining as a cutting-edge business intellegence tool

Environment &
Sustainability
CLR-5: develop and apply critical thinking, problem solving and decision-making skills

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
design and implement a quality data warehouse or data mart effectively and administer the data resources in
CO-1: - - - - - - - - - - - - - 1 -
such a way that it will truly meet management’s requirements
CO-2: learn OLAP operations and data warehousing tools - - - - - - - - - - - - - 2 -
CO-3: use data mining tools for projects and to be familiar with open-source tool - - - - - - - - - - - - - 2 -
CO-4: evaluate standards and new technologies to determine their potential impact - - - - - - - - - - - - 2 - -
CO-5: use data mining tools for projects and to build reliable products as per demand - - - - - - - - - - - - - 1 -

Unit-1 - Data Warehousing 9 Hour


Overview, Definition, Delivery Process, Difference between Database System and Data Warehouse, Multi-Dimensional Data Model, Data Cubes, Stars, Snow Flakes, Fact Constellations, Concept hierarchy, Process
Architecture, 3 Tier Architecture, Data Marting.
Tutorial:
T1: Create SnowSQL login in open-Source environment
T2: Creation of Snowflake Objects
T3: Use Time travel feature in snowflake
Unit-2 - OLAP 9 Hour
Aggregation, Historical information, Query Facility, OLAP function and Tools. OLAP Servers, ROLAP, MOLAP, HOLAP, Data Mining interface, Security, Backup and Recovery, Tuning Data Warehouse, Testing
Data Warehouse.
Tutorial:
T4: Implementation of OLAP operations – Roll up,Drill Down
T5: Implementation of OLAP operations – Slice and dice
T6: Implementation of OLAP operations – Rotate

465
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-3 - Overview of Data Mining 9 Hour
Data Mining-Definition & Functionalities, Data Processing, Form of Data Preprocessing, Data Cleaning: Missing Values, Noisy Data, Inconsistent Data, Data Integration and Transformation. Data Reduction: -
Data Cube Aggregation, Dimensionality reduction, Data 35 Compression, Numerosity Reduction, Clustering, Discretization and Concept hierarchy generation. Overview of open-source tool - Orange
Tutorial:
T7: Data Cleaning on Data Set using Orange
T8: Data Reduction on Data Set using Orange
T9: Data Transformation using Orange
Unit-4 - Concept Description 9 Hour
Definition, Data Generalization, Analytical Characterization, Analysis of attribute relevance, Mining Class comparisons, Statistical measures in large Databases. Measuring Central Tendency, Measuring Dispersion
of Data, Graph Displays of Basic Statistical class Description, Mining Association Rules in Large Databases, Association rule mining- Apriori Algorithm.
Tutorial:
T10: Generate Association Rules using the Apriori Algorithm using orange
T11: Demonstrate Statistical Analysis on Dataset using Orange
T12: Demonstrate performing Regression on data sets
Unit-5 - Cluster Analysis 9 Hour
Cluster Analysis: Data types in cluster analysis, Categories of clustering methods, Partitioning methods. Hierarchical Clustering- CURE and Chameleon, Density Based Methods-DBSCAN, OPTICS, Grid Based
Methods- STING, CLIQUE, Model Based Method –Statistical Approach, Outlier Analysis
Tutorial:
T13: Implementation of Outlier Analysis using orange tool
T14: Implementation of k-means algorithm for Iris Dataset using orange tool
T15: Demonstration of clustering rule process on data-set iris.arff using simple k-means using orange tool.

1. H.Dunham,”Data Mining: Introductory and Advanced Topics” Pearson Education. 3. Jiawei Han, Micheline Kamber,” Data Mining Concepts & Techniques” Elsevier.
Learning
2. Sam Anahory, Dennis Murray, “Data Warehousing in the Real World: A Practical Guide for 4. Mallach,” Data Warehousing System”, McGraw –Hill.
Resources
Building Decision Support Systems, Pearson Education. 5. https://orangedatamining.com/

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.P.Kanmani, SRMIST

466
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE322T MULTIVARIATE TECHNIQUES FOR DATA ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: utilize data characteristics in the form of distribution of the data structures 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: learn the statistical data reduction techniques

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the usage of multivariate techniques for the problem under the consideration

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: draw valid inferences and to plan for future investigations

Environment &
Sustainability
CLR-5: optimize the different solutions that maximize returns and minimize cost

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the characteristics of data and its properties - - - - - - - - - - - - 1 - -
CO-2: effectively select and use the data reduction techniques - - - - - - - - - - - - - - 2
CO-3: deploy the multivariate techniques to solve the real-world problems - - - - - - - - - - - - - 2 -
CO-4: acquire information and inferences from data to predict future output - - - - - - - - - - - - 2 - -
CO-5: achieve optimal solutions that maximize returns - - - - - - - - - - - - - - 1

Unit-1 - Introduction to Multivariate Analysis 9 Hour


Meaning of Multivariate Analysis - Measurements Scales - Metric measurement scales and non-metric measurement scales - Classification of multivariate techniques – Dependence Techniques - Inter-dependence
Techniques - Applications of multivariate techniques - Applications of multivariate techniques -Examples - Applications of multivariate techniques – Demo and Examples.
T1: Exploration of data sets and characteristics in PYTHON
T2: Implementation of dependent and interdependence techniques in PYTHON
T3: Explore scope of multivariate analytics in different applications using PYTHON
Unit-2 - Factor Analysis 9 Hour
Factor Analysis Introduction - Meanings, Objectives – Assumptions - Designing a factor analysis - Designing a factor analysis – Example - Designing a factor analysis – Demo – Deriving factors and assessing
overall factors - Interpreting the factors and validation of factor analysis - Interpreting the factors and validation of factor analysis – Demo and Examples.
T4: Implementation of factor analysis in PYTHON
T5: Interpreting and Validating factor analysis in PYTHON
Unit-3 - Cluster Analysis 9 Hour
Cluster Analysis Introduction - Objectives and Assumptions - Research design in cluster analysis - Deriving clusters - Assessing overall fit - Deriving clusters – Demo and examples - Hierarchical methods - Non-
Hierarchical Methods – Combinations. T7: Implement Django framework using python – creating basic Django App
T6: Implementation of cluster analysis in PYTHON
T7: Interpretation and Validation of cluster analysis in PYTHON and R

467
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Discriminant Analysis 9 Hour
Linear Programming problem Introduction - Linear Programming problem Applications - Formulation of LPP - Graphical method - Simplex method - Graphical and simplex methods – Problems, examples and demo
- Graphical and Simplex - Integer Programming - Transportation problem - Assignment problem
T10: Formulating a LPP in PYTHON from a data set
T11: Solving LPP in PYTHON – Graphical and Simplex
T12: Implementation of transportation of assignment problem in PYTHON.
Unit-5 - Visualization 9 Hour
Linear Programming problem Introduction - Linear Programming problem Applications - Formulation of LPP - Graphical method - Simplex method - Graphical and simplex methods – Problems, examples and demo
- Graphical and Simplex - Integer Programming - Transportation problem - Assignment problem
T10: Formulating a LPP in PYTHON from a data set
T11: Solving LPP in PYTHON – Graphical and Simplex
T12: Implementation of transportation of assignment problem in PYTHON.

1. Joseph F Hair, William C Black etal, “Multivariate Data Analysis” (2016). , “Multivariate 4. Malhotra, N.K. and Dash, S., 2011. Marketing Research: An Applied Orientation (; Pearson, Ed.).
Data Analysis”. Pearson Education, 7th edition, 5. Anderson, T.W., 2003. “An introduction to statistical multivariate analysis”, 3rd Edition”, Wiley.
Learning
2. Dillon, W.R. and Goldstein, M., 1984. Multivariate analysis: Methods and applications. 6. S. R. Yadav, A. K. Malik (2014) “Operations Research”, Oxford University Press.
Resources
New York (NY): Wiley. 7. https://python-for-multivariate-analysis.readthedocs.io/ “A Little Book of Python for Multivariate
3. Hamdy A Taha, (2012) “Operations Research”, Pearson, 8th Edition. Analysis”

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mrs.Sivasankari.S , Freelance Software consultancy on Big data, analytics 1. Dr.JeyaShree, Professor, Rajalakshmi Institute of Technology 1. Dr.A.Shobanadevi, SRMIST

468
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE323T MARKETING ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn to build brand architecture on brand value 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: know to create functions to access and manipulate numbers, strings and date time data

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: know the emphasis on scaling for brands

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: utilize the information for strategic marketing alternatives

Environment &
Sustainability
CLR-5: explore the experiments for digital marketing efforts

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: analyse user Generated Contents - - - - - - - 3 - 3 - - 1 - -
CO-2: analyse the digital products - - - - - - - 3 - 3 - - 2 - -
CO-3: understand customer Lifetime Value - - - - - - - - - - - - - 2 -
CO-4: analyse the marketing with ML models - - - - - - - 3 - - - - 2 - -
CO-5: communicate with digital analytics - - - - - - - - - 3 - - - - -

Unit-1 - User Generated Contents 9 Hour


Marketing Analytics, Data for Marketing Analytics, Business Intelligence, Analytics, and Data Science, Analysis, Exploratory Data Analysis, Descriptive Analysis, Predictive Analytics, Prescriptive Analytics, Benefits
of Customer Analytics, Factors Essential for Obtaining Benefits from Customer Analytics, Segmentation Analytics, Cluster Analysis.
T1: Data for Marketing Analytics
T2: Predictive Analysis
T3: Segmentation and cluster analysis
Unit-2 - Product Analysis 9 Hour
Product Analytics, Perceptual Mapping, White Spaces, Umbrella Brands, Multidimensional Scaling, Analyzing Digital Products, Analyzing Non-Digital Products,
T4: Product analysis
T5: Multimodel scaling
T5: Digital and Non - digital Products
Unit-3 - Customer Lifetime Value 9 Hour
Customer Lifetime Value (CLV), Calculating CLV, Understanding the CLV Formula, Applying the CLV Formula, Extending the CLV Formula, Using CLV to Make Decisions, A Forward-Looking Measure.
T7: Customer Lifetime Value (CLV)
T5: Applying the CLV Formula,
T6: Using CLV to Make Decisions

469
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Market Analysis 9 Hour
Market Mix Modeling, Variables in Market Mix Modeling, Techniques of Market Mix Modeling, Metrics for Tracking Customer Experience, Upgrading Customers: Use Case of Upselling, Logistic Regression Analysis,
Use of Logistic Regression as a Classification Technique
T10: Regression Analysis
T11: Multivariable Regressions
T12: Marketing Mix Models
Unit-5 - Digital Analytics 9 Hour
Search Engine Marketing, Search Engine Optimization, Social Media Analytics, App Marketing Metrics, Importance of AI in Marketing, Random Forests, Model Evaluation Using ROC, AUC, and Confusion Matrix,
Simple Feed-Forward Network, Deep Neural Network, Recommendation Systems, Necessity of Data Visualization, Visualizations Useful with Common Data Science Techniques
T13: Search Engine Marketing
T14: AI in Marketing
T15: Data Visualization Techniques

1. Seema Gupta, Avadhoot Jathar,” Marketing Analytics”, ISBN: 9789354242625 4. Fok Dennis (2003), “Advanced Econometric Marketing Models”, ERIM, ISBN 90–5892–049-6
2. Brea Cesar (2014), “Marketing and Sales Analytics: Proven Techniques and Powerful 5. Mireles Carlos Hern ́andez (2010), “Marketing Modeling for New Products”, ERIM, ISBN 978-90-
Learning
Applications from Industry Leaders”, FT Press, ISBN-0133761711 5892-237-3
Resources
3. Emmett Cox (2012), “Retail Analytics: The Secret Weapon”, Wiley, ISBN- 978-1-118- 6. Rackley Jerry (2015), “Marketing Analytics Roadmap: Methods, Metrics, and Tools”, Apress, ISBN-
09984-1 1484202597

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.K.Jafar Ali MBA, Ph.D. Consultant, iSpark Learning 1. Angeline Gautami Fernando, Associate Professor (Marketing & 1. Dr. R. Rajkumar, SRMIST
Solutions, Chennai. Analytics) at Great Lakes Institute of Management

470
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE325T APPLIED SOCIAL NETWORK ANALYSIS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand mathematical concepts of a network and centrality 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: find the importance of social influence

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: know about balance networks

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn the concepts and methods of social networks

Environment &
Sustainability
CLR-5: understand about the algorithms related to web graph searching

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: find the important node in each graph network - - - - - - - - - - - - 1 - -
CO-2: implement to find communities in the graph network - - - - - - - - - - - - - 2 -
CO-3: convert unstable to stable network - - - - - - - - - - - - 2 - -
CO-4: detecting the communities in the network - - - - - - - - - - - - - - 2
CO-5: code page ranking algorithms for web graph - - - - - - - - - - - - - - 1

Unit-1 - Introduction to Social Network 9 Hour


SNA Introduction - Basic Network Concepts, Adjacency Matrices, Graphs, and Notation, Nodes and Links – Centrality Measures - “What is “Centrality” and why do we Study IT, Calculating Nodal Centrality Measures,
Directed Networks and Centrality Measures, Location in the Network - Graph Level Measures – Density, Diameter, Centralization, Average Centralities, Network Topology.
T1: Introduction to networkx
T2: Finding connectedness of a graph
T3: Implementation of centrality measures
Unit-2 - SNA Algorithms 9 Hour
SNA Algorithms -Node assortativity coefficients and correlation measures, Directed Acyclic Graphs & Topological Sort, Dinitz’s algorithm and its applications, Euler’s Algorithm – Graph Generators - Geometric
Generator Models, Sudoku, and Graph coloring.
T4: Calculate the assortativity coefficient
T5: Implement programs for Directed Acyclic Graphs & Topological Sort
T6: Implement Maximum flow problem
Unit-3 - Establishing Stable Networks 9 Hour
Exploring Social Networking Data Sets - Establishing a Social Network, Connectivity of Users in Social Networks, Case Study of Facebook. Signed Networks - unstable network to stable network
T7: Code to find unstable network
T8: Find the number of unstable triangles
T9: Solution to convert unstable into stable network

471
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Communities in the Network 9 Hour
Community Detection - Strength of Weak Ties, Triadic Closure, Detecting Communities in a Network, Girvan-Newman Algorithm Modularity, Minimum Cut Trees, Tie Strengths in Mobile Communication Network,
Exact Betweenness Centrality
T10: Detect the communities in the graph
T11: Code for Triadic Closure
T12: Explore the strong and weak ties in the network
Unit-5 - Link Analysis in Web 9 Hour
The Structure of the Web - The World Wide Web, Information Networks, Hypertext, and Associative Memory, The Web as a Directed Graph, The Bow-Tie Structure of the Web, The Emergence of Web - Link
Analysis and Web Search - Searching the Web: The Problem of Ranking, Link Analysis Using Hubs and Authorities, PageRank, Applying Link Analysis in Modern Web Search – Power Law.
T13: Implement points distribution method
T14: Code for random walk method
T15: Explore the tools related to SNA

1. Ian McCulloh (2013), Social Network Analysis with Applications, Wiley 4. Krishna Raj P. M., Ankith Mohan, and K. G. Srinivasa (2018), Practical Social Network
Learning 2. https://networkx.org/nx-guides/index.html Analysis with Python, springer.
Resources 3. Edited by Mohammad Gouse Galety Chiai Al Atroshi Bunil Kumar Balabantaray and Sachi 5. David Easley Cornell University Jon Kleinberg Cornell University (2010), Networks, Crowds,
Nandan Mohanty (2022), Social Network Analysis, Theory and Applications, Wiley and Markets Reasoning about a Highly Connected World Cambridge University Press.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mrs.Sivasankari.S , 1. Dr.A.Bhuvaneswari, Professsor, VIT, 1. Dr.G.Vadivu, SRMIST
Freelance Software consultancy on Big Data, Analytics School of Computer Science and Engineering,Chennai

472
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE326T ARTIFICIAL NEURAL NETWORKS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the biological background and basic concepts of neural networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: gain knowledge about perceptron and back propagation

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: know about various training rules and error minimization

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn the concepts of unsupervised neural networks

Environment &
Sustainability
CLR-5: explore the fine-tuning procedures and case studies for designing neural network models

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: explain the basic concepts of neural networks - - - - - - - - - - - - 1 - -
CO-2: describe perceptron and back propagation - - - - - - - - - - - - - 2 -
CO-3: apply various training rules in neural networks - - - - - - - - - - - - 2 - -
CO-4: explain unsupervised neural networks - - - - - - - - - - - - - - 2
CO-5: fine tune the neural networks - - - - - - - - - - - - - - 1

Unit-1 - Introduction to Neural Networks 9 Hour


History of neural network research- Biological inspiration: Neural computation, Models of computation, Elements of computing models- Network of neurons: structure, Information processing at neurons and synapses,
Information storage, Neurons as self-organizing systems- Artificial Neural Networks: Network of primitive functions, approximation of functions- Neuron Model: Single and multiple input neurons, Transfer functions-
Network architectures: Single layered and multi layered neurons, Recurrent Networks
Tutorials:
1. Implement various neural network architectures
2. Implement and study the effect of various activation functions
Unit-2 - Perceptron 9 Hour
Introduction to Perceptron- Perceptron Architecture: Single Neuron Perceptron, Multi Neuron Perceptron- Perceptron learning rule: Constructing Learning rules, Unified Learning rule, Training multi neuron perceptron-
Complexity of perceptron learning-Computational Limits of Perception-Linearly separable functions- Learning XOR-Feed forward Networks- Back propagation: Chain of rule Calculus, Back-Propagation Computation
in Fully-Connected Multi-layer Perceptron
Tutorials:
3. Implement Feed forward networks
4. Implement back propagation

473
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-3 - Learning and Training 9 Hour
Paradigms of Learning - Using training samples - Gradient Optimization Procedure- Batch Gradient Descent, Stochastic Gradient Descent, Mini-Batch Gradient Descent - Hebbian learning rule – Delta learning rule-
Convergence and local minima, representational power of feed forward networks, hypothesis search space and inductive bias, generalization, overfitting and stopping criterion-Error functions, Error minimizing
procedures-Hebbian learning
Tutorials:
5. Implementation of gradient descent
6. Implementation of delta learning rule
Unit-4 - Unsupervised Neural Networks 9 Hour
Unsupervised learning in neural networks: Hebbian learning rule, Principle Component Learning, Learning Vector Quantizer-I- Self Organizing Maps: Functionality, Training, Topology Function, Decreasing Learning
Rate, Variations of SOMs, Neural gas, Multi-SOM, Multi-neural gas, Growing neural gas- Adaptive Resonance Theory, Orienting subsystems, Learning Laws
Tutorials:
7. Implementation of Principle Component analysis
8. Implementation of Self Organizing Maps
Unit-5 - Tuning the Neural Networks 9 Hour
Pretraining the model: Data selection, Preprocessing, Selection of network architecture- Training the network: Initializing weights, Choice of training algorithm, stopping criteria, Choice Of performance function,
Committees of Networks-Post Training Analysis: Fitting, Pattern Recognition, Clustering- Time delay and Recurrent Neural Networks-Case Studies: Smart Sensor system with function approximation- Myocardial
Infarction Recognition using pattern recognition-Forest cover problem using Clustering

1. Martin T. Hagan, Neural Network Design, 2nd edition. 4. Andries P., Computational Intelligence: An Introduction, Second Edition, Wiley, 2007
Learning
2. Tom M. Mitchell, Machine Learning, McGraw-Hill Education (India) Private Limited. 5. David Kriesel, A Brief Introduction to Neural Networks, 2009
Resources
3. Ian Goodfellow, Yoshua Bengio, and Aaron Courville, Deep Learning, MIT Press, 2016

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Sharanya, SRMIST

474
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE327T CLOUD COMPUTING FOR DATA ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: comprehend fundamentals of cloud application development 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: deployment of Cloud Applications using Cloud Native Services

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: design various Cloud Applications

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the Cloud Security and Cloud pricing models

Environment &
Sustainability
CLR-5: learn the purpose of stream processing and its basic components

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: comprehend Cloud fundamental Concepts - - - - - - - - - - - - 1 - -
understand virtualization foundations to cater the needs of elasticity, portability, and resilience by cloud
CO-2: - - - - - - - - - - - - 2 - -
service providers
CO-3: compare operation and economic models of various trending cloud platforms prevailing in IT industry - - - - - - - - - - - - - 2 -
CO-4: design a cloud framework with appropriate resource management techniques with its security - - - - - - - - - - - - - - 2
CO-5: understand the concepts of Transfer Learning - - - - - - - - - - - - 1 - -

Unit-1 - Introduction Cloud Computing 9 Hour


Introduction-- Cloud Introduction –NIST Definition: Cloud service Models - IaaS/ PaaS / SaaS, Deployment Models –Public, Private, Hybrid and Community, Cloud Characteristics, Cloud Challenges –user, Service
Provider end, Applications of Cloud, Cloud federation, Cloud Enabling Technology, - Challenges and Issues-LAB1: Hosted Hypervisor and Bare Metal Hypervisor- LAB2: Install a Virtual box / VMware Workstation
with different flavours of linux or windows.LAB:3: Configure Kafka Streaming on cloud.
Unit-2 - Cloud Resource Virtualization 9 Hour
Hypervisors – Type 1 Hypervisors – Type 2 Hypervisors –. Basics of Virtualization - Types of Virtualizations - Understanding Hypervisors - Implementation Levels of Virtualization -Virtualization Structures - Tools
and Mechanisms – Resource sharing and Resource pooling -Desktop Virtualization – Server Virtualization.LAB3: Implementation of Virtual Machine(S) and create a Virtual Datacenter.LAB4: Kafka simple producer
consumer message passing, topics and partitions on cloud.
Unit-3 - Advances in Cloud Platforms 9 Hour
Comparing Amazon web services, Google AppEngine, Microsoft Azure from the perspective of architecture (Compute, Storage Communication) services and cost models. Working with EC2 API – Google App
Engine API - Facebook API, Twitter API. Overview on Public Cloud Platforms-AWS, Amazon Web Services (AWS), Azuer, Google Cloud Platform (GCP). Docker, Containers, Usage of containers, Terminology,
Docker Run Static sites, Docker Images, Docker File, Docker on AWS, Devops.LAB5: Deployment of VMs in AWS. LAB6: Install a docker engine and docker client on windows. LAB7: Creation and removal of
container, container images. Lab 8:: Building Kafka Streams application on cloud.

475
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 – Cloud Security 9 Hour
Cloud Application Development – Cloud Application Execution, Applications using Containers - Testing the Cloud Application, Case study on Cloud Application – Cloud Security Concepts - Cloud Security Threats,
Cloud Security Mechanisms: Encryption , Public Key Infrastructure, Identity and Access Management, Single Sign-On: Kerberos authentication , Mobile Cloud, Green Cloud.LAB9: Find a procedure to transfer the
files from one virtual machine to another virtual machine Using VMWare. LAB10: Install Google App Engine. Create a hello world app and other simple web applications using python/java. Lab 11: Docker
Containerization Lab 14:: Configure Apache Storm single node cluster on cloud.
Unit-5 - Stream Processing 9 Hour
Introduction to Stream Processing - Batch vs Stream Processing, Examples of stream processing - Applications of stream processing - Stateful Stream Processing - Stream Processing Graph - Data Sources, Stream
processing pipelines, Sinks - Transformations and Aggregation - Windowing - Stateless and stateful processing - Effect of time in stream processing - Complexity analysis. LAB15: : Build Apache Storm Word Count
Topology on cloud.

1. Rajkumar Buyya, James Broberg, Andrzej, M. Goscinski, Cloud Computing: Principles 5. Buyya, Rajkumar, Christian Vecchiola, and S. Thamarai Selvi. Mastering Cloud Computing:
and Paradigms, Wiley, 1st Edition, 2013. Foundations and Applications Programming, Tata Mcgraw Hill, 1 st Edition, 2017.
2. Sosinsk, Barrie, Cloud Computing Bible, John Wiley & Sons, 1 st Edition, 2011. 6. Ellis B, Real-Time Analytics – Techniques to analyze and visualize streaming data, 1st ed., John
Learning 3. Docker: Up & Running: Shipping Reliable Containers in Production”, Sean P. Kane, Wiley & Sons Inc,2014
Resources Karl Matthias, O’Reilly Media Inc, 2015. 7. Mark Wilkins, “Learning Amazon Web Services (AWS): A Hands-On Guide to the Fundamentals of
4. Thomas Erl, ZaighamMahmood, RichardoPuttini, "Cloud Computing: Concepts, AWS Cloud”, 2019.
Technology and Architecture", Fourth Printing, 2014, Prentice Hall/PearsonPTR, ISBN: 8. https://cloudacademy.com/course/introduction-to-devops/intro-3/
9780133387520.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 40% - 40% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 10% - 10% - 10% -
Level 4 Analyze 10% - 10% - 10% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Rajarajan Sundaramurthy, Senior Vice President - Devops 1. Dr.N.Manikandan, SRMIST

476
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE373T STREAMING ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic building blocks of stream processing 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: relate streaming data in real time

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: explore the data ingestion options into stream processing engines

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: extend stream processing results to end users

Environment &
Sustainability
CLR-5: explore NOSQL storage options to store real time data

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: illustrate the concepts and terminologies in stream processing 2 3 - 2 2 - - - - - - - 2 - -
CO-2: interpret stream processing applications using Apache Spark Streaming 2 2 - 2 2 - - - - - - - - 3 -
CO-3: summarize real-time streaming data pipelines and applications that adapt to the data streams using Kafka 2 2 - 2 2 - - - - - - - - 3 -
CO-4: interpret stream processing applications using Apache Storm Streaming 2 2 - 2 2 - - - - - - - - 3 -
CO-5: inquire real time data using NoSQL databases & MongoDB 2 2 - 2 2 - - - - - - - - - 3

Unit-1 - Fundamentals of Stream Processing 9 Hour


Introducing Stream Processing, Stream Processing, Examples of Stream Processing, Scaling Up Data Processing, Distributed Stream Processing, Stream-Processing Model, Sources and Sinks, Immutable Streams
Defined from One Another, Transformations and Aggregations, Window Aggregations, Stateless and Stateful Processing, Stateful Streams, An Example: Local Stateful Computation in Scala, Stateless or Stateful
Streaming, Streaming Architectures, Components of a Data Platform, Architectural Models, The Use of a Batch-Processing Component in a Streaming Application, Referential Streaming Architectures, Streaming
Versus Batch Algorithms
Unit-2 - Apache Spark and Structured Streaming 9 Hour
Apache Spark as a Stream-Processing Engine, Spark’s Distributed Processing Model, Spark’s Resilience Model, Introducing Structured Streaming, The Structured Streaming Programming Model
Unit-3 - Kafka-A Realtime Data and Stream Processing 9 Hour
Getting Started with Kafka, Kafka, Publish Subscribe messaging model, Kafka Architecture, Messages and Batches, Schemas, Topics and Partitions, Producers and consumers, Brokers and Clusters, Multiple
Clusters, Data Ecosystem, Kafka Producers: Writing messages to Kafka, Kafka Consumers - Reading data from Kafka, Stream Processing- Stream Processing Design Patterns-Kafka Streams by Examples- Kafka
Streams: Architecture Overview
Unit-4 - Apache Storm 9 Hour
che Storm – Introduction, Real-Time Processing and Storm Introduction, Storm Deployment, Topology Development, and Topology Options, Storm Parallelism and Data Partitioning, Integration of Storm, and Kafka
Unit-5 - NoSQL Databases in Cloud and MongoDB 9 Hour
NoSQL Data Bases, AWS Cloud Dynamo Database: Amazon DynamoDB features, Serverless, Introduction to MongoDB, MongoDB Data Model, MongoDB Architecture - Core Processes, MongoDB Tools,
Standalone Deployment, Replication, Sharding, MongoDB Use Cases- Performance Monitoring, and Social Networking.

477
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Garillot F and Mass. G., Stream Processing with Apache Spark, 1st ed., O'Reilly Media, Inc., 2019. 4. https://docs.mongodb.com/manual/changeStreams/
Learning 2. Narkhede N, Shapira. G, and Palino T., Kafka: The Definitive Guide - Real-Time Data and 5. Shakuntala Gupta Edward Navin Sabharwal, "Practical MongoDB Architecting,
Resources Stream Processing at Scale, 1st ed., O'Reilly Media, Inc.,2017 Developing,and Administering MongoDB"Apress,2016
3. Ankit Jain, Mastering Apache Storm, 1st ed., Packt Publishing,2017 6. https://aws.amazon.com/dynamodb/features/?pg=dynamodbt&sec=hs

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Gangeyan Ranganathan, Project Delivery Specialist Ii , 1. Dr Surendiran B, Associate Professor, National Institute of 1. Dr. B Yamini, SRMIST
Deloitte Consulting Llp, Sacramento, California Technology, Puducherry
2. Mr. Shri Raghu Raaman, Solidity Developer, Pixelvault Inc., 2. Dr. Selvakumar K., B.E., M.E., Ph. D, Assistant Professor Grade-II, 2. Dr. G Suseela, SRMIST
Toronto, Canada Department of Computer Applications, National Institute of Technology
Trichy, Tiruchirappalli-620015, Tamil Nadu, India

478
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE421T BUSINESS INTELLIGENCE AND ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: familiarize with Business Intelligence, Analytics and Decision Support 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the technologies for Decision making

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: familiarize with predictive modeling techniques

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: familiarize with sentiment analysis techniques

Environment &
Sustainability
CLR-5: understand about Decision-making systems

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain knowledge on Business Intelligence, Analytics and Decision Support - - - - - - - - - - - - 1 - -
CO-2: understand the technologies for Decision making - - - - - - - - - - - - - 2 -
CO-3: apply predictive modeling techniques - - - - - - - 3 - 3 - - 2 - -
CO-4: apply sentiment analysis techniques - - - - - - - 3 - 3 - - - - 2
CO-5: gain knowledge on Decision-making systems - - - - - - - 3 - 3 - - - 1 -

Unit-1 - Introduction: Business Intelligence, Analytics and Decision Support 9 Hour


Information Systems Support for Decision Making - An Early Framework for Computerized Decision Support - The Concept of Decision Support Systems - A Framework for Business Intelligence - Business Analytics
Overview - Brief Introduction to Big Data Analytics - Clickstream Analysis – Metrics - Clickstream Analysis - Practical Solutions - Competitive Intelligence Analysis
T1: Introduction to Power BI and SSMS
T2: Installing Power BI and SSMS
T3: Prepare data in Power BI Desktop
Unit-2 - Decision Making 9 Hour
Decision Making - Introduction and Definitions - Phases of the Decision - Making Process - The Intelligence Phase - Design Phase - Choice Phase - Implementation Phase - Decision Support Systems Capabilities
- Decision Support Systems Classification - Decision Support Systems Components
T4: Load data in Power BI Desktop
T5: Model data in Power BI Desktop part-1
T6: Model data in Power BI Desktop part-2
Unit-3 - Predictive Modeling and Sentiment Analysis 9 Hour
Basic Concepts of Neural Networks - Developing Neural Network - -Based Systems - Illuminating the Black Box of ANN with Sensitivity - Support Vector Machines - A Process Based Approach to the Use of SVM
- Nearest Neighbor Method for Prediction -Sentiment Analysis Overview - Sentiment Analysis Applications - Sentiment Analysis Process - Sentiment Analysis - Speech Analytics
T7: Implement data model using SQL in Power BI
T8: Create DAX calculations in Power BI Desktop part-1
T9: Create DAX calculations in Power BI Desktop part-2
479
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Multi-Criteria Decision-Making Systems 9 Hour
Decision Support Systems modeling - Structure of mathematical models for decision support - Decision making under certainty - Uncertainty and Risk - Decision modeling with spreadsheets -
Mathematical programming optimization - Decision analysis introduction - Decision tables - Decision Trees - Multi-criteria decision making - Pairwise comparisons
T10: Design a report in Power BI Desktop part-1
T11: Design a report in Power BI Desktop part-2
T12: Create a Power BI dashboard
Unit-5 - Automated Decision Systems 9 Hour
Automated Decision Systems - The Artificial Intelligence field - Basic concepts of Expert Systems - Applications of Expert Systems - Structure of Expert Systems - Knowledge Engineering -
Development of Expert Systems - Location based Analytics - Cloud Computing - Business Intelligence
T13: Create a Power BI paginated report
T14: Perform data analysis in Power BI Desktop
T15: Enforce Row-level security

1. Ramesh Sharda, Dursun Delen, EfraimTurban, J.E.Aronson, Ting-Peng Liang, David King, “Business 3. Alberto Ferrari Marco Russo, “Definitive Guide to DAX, The: Business intelligence for
Learning Intelligence and Analytics: System for Decision Support”, 10th Edition, Pearson Global Edition, 2013. Microsoft Power BI, SQL Server Analysis Services, and Excel”, Second Edition, By
Resources 2. Brett Powell, “Mastering Microsoft Power Bi: Expert techniques for effective data analytics and Pearson, 2020
business intelligence”, 2018

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.V.Selvakumar,Hexaware Technologies, [email protected] 1. Dr. T. Veerakumar, Professor, NIT Goa 1. Dr. T. Karthick, SRMIST

480
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE422T CONVOLUTIONAL NEURAL NETWORKS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the evolution of neural networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: utilize the knowledge for model development

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: fine tune the performance with optimization techniques

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: utilize class and build domain model for real-time programs

Environment &
Sustainability
CLR-5: construct CNN model for image-based applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand fundamentals of Neural Networks - - - - - - - - - - - - 1 - -
CO-2: understand fundamentals of CNN Architecture - - - - - - - - - - - - - 2 -
CO-3: apply performance optimization - - - - - - - - - - - - - - 2
CO-4: compare different CNN Architectures - - - - - - - - - - - - 2 - -
CO-5: apply CNN in image classification - - - - - - - - - - - - - - 1

Unit-1 - Introduction to AI & ML 9 Hour


Types of ML-Old versus new ML-Artificial neural networks-Activation functions The XOR problem-Training neural networks-Backpropagation and the chain rule-Batches Loss functions-The optimizer and its
hyperparameters- Underfitting versus overfitting Feature Scaling-Fully connected layers
T1: Implement Simple Programs like vector addition in TensorFlow.
T2: Implement a simple problem like regression model in Keras.
T3: Implement a perceptron in TensorFlow/Keras Environment.
Unit-2 - Fundamental CNN Architecture 9 Hour
Convolution Input Padding-Calculating the number of parameters (weights)- Calculating the number of operations-Converting convolution layers into fully connected layers-The pooling layer-1x1 Convolution-
Calculating the receptive field-Building a CNN model in TensorFlow.
T1: Implement a CNN based classifier of handwritten digits: The Convolution Layer
T2: Implement a CNN based classifier of handwritten digits: The Max Pooling Layer
T3: Implement a CNN based classifier of handwritten digits: The Fully Connected Layer
Unit-3 - Performance Optimization 9 Hour
Number of hidden layers -Number of neurons per hidden layer -Batch normalization -Advanced regularization and avoiding overfitting -Applying dropout operations with TensorFlow -Which optimizer to use? -Memory
tuning - Appropriate layer placement -Building the second CNN by putting everything together - Dataset description and preprocessing -Creating the CNN model -Training and evaluating the network.
T1: Implement a CNN with Adam optimizer
T2: Implement a CNN and apply dropout operations with TensorFlow
T3 Implement a CNN with a validation technique
481
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Popular CNN Model Architectures 9 Hour
Introduction to ImageNet -LeNet -AlexNet architecture -VGGNet architecture -VGG16 image classification code example -GoogLeNet architecture -Architecture insights -Inception module -ResNet architecture.
T1: Implement Image Net model for a Dataset
T2: Traffic sign classifiers using AlexNet
T3: Implement VGGNet model for a Dataset
Unit-5 - Image Classification 9 Hour
CNN model architecture-Cross-entropy loss (log loss)-multi-class cross entropy loss-The train/test dataset split-Datasets-ImageNet-CIFAR-Loading CIFAR- -Building the CNN graph-Learning rate scheduling-
Introduction to the tf.data API-Main training loop-Model Initialization-Do not initialize all weights with zeros-Initializing with a mean zero distribution-Xavier-Bengio and the Initializer-Improving generalization by
regularizing-L2 and L1 regularization.
T1: Implement Image classification with TensorFlow
T2: Build TensorFlow input pipelines for image
T3: Implement a CNN for Image processing L2 regularization

1. Iffat Zafar, Giounona Tzanidou, Richard Burton, Nimesh Patel, Leonardo Araujo," Hands-On 3. Charu C. Aggarwal. Neural Networks and Deep Learning: A Textbook. Springer. 2019.
Learning Convolutional Neural Networks with TensorFlow", “, Packt Publishing,2018. 4. Stanford University Course http://cs231n.stanford.edu/2018/syllabus.html
Resources 2. Mohit Sewak, Pradeep Pujari, Md. Rezaul Karim,"Practical Convolutional Neural Networks:
Implement Advanced Deep Learning Models Using Python, ",Packt Publishing ,2018

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Gowtham Kumar Jyayachandiran Assistant Vice President Nomura 1. Dr.K.Arthi, SRMIST

482
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE423T BIG DATA VISUALIZATION E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the basics of EDA analysis and exploring PyViz, HoloViz for data visualization 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: know to perform D3 for data visualization

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: utilize the Matplotlib library to visualize data

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: explore the Tableau to visualize data

Environment &
Sustainability
CLR-5: explore the Apache Superset to visualize data

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: use EDA techniques to identify insights of data and data visualization using PyViz and HoloViz - - - - - - - - - - - - 1 - -
CO-2: create effective visualization using D3 templates - - - - - - - - - - - - - 2 -
CO-3: implement the code to visualize data using Matplotlib - - - - - - - - - - - - - - 2
CO-4: visualize different kinds of dataset using Tableau - - - - - - - - - - - - 2 - -
CO-5: visualize different kinds of dataset using Apache Superset - - - - - - - - - - - - - - 1

Unit-1 - Introduction to Eda, PyViz and HoloViz 9 Hour


Fundamentals of EDA-EDA with Personal Email-Descriptive Statistics-EDA on Wine Quality Data Analysis-Exploratory data analysis using seaborn-Using PyViz / HoloViz (Geoviews, Datashader, HvPlot)-creating
several types of Leaflet maps using folium.
T1: A data-centric approach to visualization using plot, T2: Building interactivity in plots, T3: Building dashboards using Panel
Unit-2 - Data Driven Documents-D3 9 Hour
Introduction to D3-Getting started with D3-D3 visualization sample templates-Displaying Results Using D3-Create a summary file for visualization-Visualization using HTML document-Data visualization showing the
stacked view-Bar chart-Multiple Donuts-Stacked Area-Pie chart
T4: Identifying appropriate template for the available dataset, T5: Displaying results using D3, T6: Creating visualization showing bar chart, donuts, pies using D3
Unit-3 - Visualization with Matplotlib 9 Hour
Simple Line Plots-Simple Scatter Plots-Visualizing Errors-Density and Contour Plots-Histograms, Binnings, and Density-Customizing Plot Legends-Customizing Colorbars-Multiple Subplots-Text and Annotation-
Customizing-Ticks-Customizing Matplotlib: Configurations and Stylesheets-Three-Dimensional Plotting in Matplotlib-Geographic Data with Basemap-Visualization with Seaborn
T7: Implement simple plotting using Matplotlib, T8: Customizing colorbars, multiple subplots, text and annotation using Matplotlib, T9: Implement geographic data visualization using Seaborn
Unit-4 - Tableau Your Data 9 Hour
Creating Visual Analytics with Tableau Desktop: shortcomings of traditional information analysis, Workspace-Connecting to Your Data :Connection, Generated values, Data Extract, Joining, Blending, Data Quality-
Building Your First Visualization-creating calculations to enhance Your Data: Showme, Trendline, sorting, filters, sets, groups-Creating Calculations to Enhance Your Data: Aggregation, calculated values, Formulas,
function reference-Bringing It All Together with Dashboards: understanding, right way, best practices
T10: Exploring the workspaces of Tableau, T11: Building simple visualization using Tableau, T12 Building dashboards using Tableau

483
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Apache Superset 9 Hour
Getting Started with Data Exploration: Installing, sharing, configuring, add database, uploading, customization -Configuring Superset and Using SQL Lab: setting wen server, creation, migration, securing, caching,
mapbox-User Authentication and Permissions: security, google sign in, list users page, views/ menus, list permission, user statistics page-Visualizing Data in a Column-Comparing Feature Values-Drawing
Connections between Entity Columns-Mapping Data That Has Location Information-Building Dashboards
T13: Exploring the workspaces of Superset, T14: Building simple visualization using Superset, T15 Building dashboards using Superset

1. Jake VanderPlas (2017). Python Data Science Handbook: Essential Tools for Working 5. Big Data Visualization, James D. Miller, Copyright © 2017 Packt Publishing Ltd.
with Data. First Edition O'Reilly Media, Inc. ISBN-10: 1491912057, ISBN-13:978- 6. Tableau Your Data:Fast and Easy Visual Analysis with Tableau Software- Daniel G.Murray, with
1491912058. the InterWorks team, John Wiley & Sons, Inc. ISBN: 978-1-118-61204-0
2. Suresh Kumar Mukhiya, Usman Ahmed (2020). Hands-On Exploratory Data Analysis 7. Shai Vaingast, “Beginning Python Visualization Crafting Visual Transformation Scripts”, Apress,
Learning with Python: Perform EDA techniques to understand, summarize, and investigate your 2nd edition, 2014.
Resources data, Copyright © Packt Publishing Ltd. 8. Wes Mc Kinney, “Python for Data Analysis”, O'Reilly Media, 2012.
3. Shashank Shekhar (2018). Apache Superset Quick Start Guide-Develop interactive 9. Wesley J.Chun,”Core Python Applications Programming,3rd ed,Pearson,2016
visualizations by creating user-friendly dashboards, -Copyright © Packt Publishing Ltd. 10. https://pyviz.org/
4. Mike Dewar (2012). Getting Started with D3. O'Reilly Media, Inc., 11. https://holoviz.org/
ISBN:9781449328795

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Vishwa Prasath T S Technology Analyst Accenture Pvt Ltd 1. Mr.C.M.T.Karthikeyan, Asst. Professor, Government College of Engineering - Bargur 1. Dr. P.Rajasekar, SRMIST

484
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE424T DEEP LEARNING FOR DATA ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the theoretical foundations, algorithms, and methodologies of convolutional neural networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: identify and apply appropriate recurrent neural networks for analyzing the data for variety of problems

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the principles and applications of computer vision

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: construct Generative Adversarial Networks to solve real - world problems

Environment &
Sustainability
CLR-5: understand different methodologies to create application using deep nets

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: recognize the characteristics of convolutional neural networks and the use of optimizer - - - - - - - - - - - - 1 - -
CO-2: analyze various recurrent neural networks models - - - - - - - - - - - - 2 - -
CO-3: apply the Deep Learning models for Computer Vision - - - - - - - - - - - - - 2 -
CO-4: solve various real - world problems using Generative Adversarial Networks - - - - - - - - - - - - - - 2
CO-5: build a Deep Reinforcement Learning models for solving various problems - - - - - - - - - - - - - - 1

Unit-1 - Convolutional Neural Networks 9 Hour


Introduction to Convolutional neural networks – Autoencoders: types, denoising, Convolutional autoencoder example, Uses and limitations – Variational autoencoders: Parameters to define a normal distribution,
VAE loss function, Kullback-Leibler divergence, Training the VAE, The reparameterization trick – Applications of autoencoders – Optimizers: Gradient Descent, RMSProp, Adam
Tutorial:
T1. To build a convolutional autoencoder model for the MNIST dataset, T2. To build a convolutional variational autoencoders for the MNIST dataset
Experiment with different learning rates and objective functions for gradient descent
Unit-2 - Recurrent Neural Networks 9 Hour
Recurrent Neural Networks: Overview, Neural Networks with and without Hidden States, RNN-based Character-Level Language Models - Implementation: RNN Model, RNN-based Language Model, Gradient
Clipping, Training, Decoding - Long Short-Term Memory (LSTM), Gated Recurrent Units (GRU)
Tutorial:
T3. To implement the RNN model using the H. G. Wells’ The Time Machine data set. T4. To implement the LSTM model using the H. G. Wells’ The Time Machine data set.
To implement the GRU model using the H. G. Wells’ The Time Machine data set.
Unit-3 - Deep Learning for Computer Vision 9 Hour
Image Augmentation - Object Detection and Bounding Boxes - Anchor Boxes - Multiscale Object Detection - Region-based CNNs: R-CNNs, Fast R-CNN, Faster R-CNN, Mask R-CNN
Tutorial:
T5. To demonstrate object detection model banana detection dataset. T6. To implement the classification model for CIFAR-10 dataset.
To implement the classification model for Dog Breed Identification dataset

485
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Generative Adversarial Networks 9 Hour
Generative Adversarial Networks: Generator, Discriminator, Loss function, Generator loss, Discriminator loss, Training - Deep Convolutional Generative Adversarial Networks: Wasserstein GAN, BEGAN, CycleGAN
- Conditional GANs: Pix2Pix.
Tutorial:
T7. To build a model using GAN to resemble MNIST digits. , T8. To implement a Deep Convolutional GAN to generate complex color images.
To implement a Deep Convolutional GAN on Fashion-MNIST data set using ReLU as activation function for generator, leaky ReLU as activation function for discriminator.
Unit-5 - Deep Reinforcement Learning 9 Hour
Stateless Algorithms: Na¨ıve Algorithm, ε-Greedy Algorithm, Upper Bounding Methods - The Basic Framework of Reinforcement Learning: Challenges, Simple Reinforcement Learning for Tic-Tac-Toe, Role of Deep
Learning, and a Straw-Man Algorithm
Tutorial:
T9. Self-Learning Robots - Case Study, T10. Building Conversational Systems: Deep Learning for Chatbots - Case Study
Self-Driving Cars - Case Study

1. Iffat Zafar, Giounona Tzanidou, Richard Burton, Nimesh Patel, Leonardo Araujo, Hands-On Convolutional 4. Ian Goodfellow, Yoshua Bengio and Aaron Courville, Deep Learning, the MIT
Neural Networks with TensorFlow, Packt Publishing, 2018. (Unit I) Press, 2017.
Learning
2. Aston Zhang, Zack C. Lipton, Mu Li, Alex J. Smola, Dive into Deep Learning, arXiv preprint, 2021 5. Umberto Michelucci, Applied Deep Learning – A Case-Based Approach to
Resources
(http://d2l.ai/index.html) (Unit II, III & IV) Understanding Deep Neural Networks, Apress, 2018.
3. Charu C. Aggarwal, Neural Networks and Deep Learning - A Text Book, Springer Nature, 2018. (Unit V) 6. François Chollet, Deep Learning with Python, Manning Publications, 2018.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. M. Prakash, SRMIST
2. Dr.G.Vadivu, SRMIST

486
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE425T ADVANCED MACHINE LEARNING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the definition of a range of neural network models 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
understand neural implementations of attention mechanisms and sequence embedding models and how
CLR-2:

Environment & Sustainability


these modular components can be combined to build state of the art NLP systems

The engineer and society


Conduct investigations of
CLR-3: understand the mathematics necessary for constructing novel machine learning solutions

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


focusing on recent advances in deep learning with neural networks, such as recurrent and Bayesian

Modern Tool Usage


CLR-4:

Life Long Learning


complex problems
Problem Analysis
neural networks

Communication
introduce the mathematical definitions of the relevant machine learning models and derive their
CLR-5:
associated optimization algorithms

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: derive and implement optimization algorithms for these models - - - - - - - - - - - - - 1 -
CO-2: implement and evaluate common neural network models for language - - - - - - - - - - - - - 2 -
CO-3: choose a model to describe a particular type of data - - - - - - - - - - - - - - 2
CO-4: design and implement various machine learning algorithms in a range of real world applications - - - - - - - - - - - - - 2 -
covers a range of applications of neural networks in natural language processing, including analyzing
CO-5: - - - - - - - - - - - - 2 - -
latent dimensions in text, translating between languages, and answering questions

Unit-1 - Reinforcement Learning 9 Hour


Introduction to Reinforcement Learning, Basic concepts in RL, value iteration, policy iteration, Model-Based Reinforcement Learning (Dynamic Programming), value function approximator Model-Free Reinforcement
Learning (SARSA, Monte Carlo, Q-Learning), Approximate and Deep Reinforcement Learning (Deep Q-Learning), Policy Gradient Reinforcement Learning, Advanced Topics on Exploration and Planning
T1: Implementation of reinforcement learning using public dataset – chatbot, T2: Implementation of Deep Reinforcement learning, T3: Implementation of Policy Gradient reinforcement learning
Unit-2 - Machine Learning with Graphs 9 Hour
Introduction; Machine Learning for Graphs, Traditional Methods for ML on Graphs, Node Embeddings, Link Analysis: PageRank, Label Propagation for Node Classification, Graph Neural Networks 1: GNN Model,
Graph Neural Networks 2: Design Space, Applications of Graph Neural Networks, Knowledge Graph Embeddings, Reasoning over Knowledge Graphs, Frequent Subgraph Mining with GNNs
T4: Building Graph Neural Networks using PYTHON, T5: Implementation of Knowledge Graphs, T6: Implementation of Frequent Subgraph Mining with GNNs
Unit-3 - Ensemble Learning Models 9 Hour
Markov models - Hidden Markov models - Ensemble learning methods - Regularizations-pros and cons-Voting, Boosting, Adaboost - Gradient Boosting - Bagging with its impact on bias and variance - Random
Forest - Fine Tuning Ensemble - Cascading - Application Face recognition - using Ensemble techniques - Examples - Learning - Conditional random fields (CRFs) - Structural SVMs
T7: Implementation of Ada boosting and Gradient Boosting using public dataset, T8: Implementation of Bagging Classifiers using public dataset,
T9: Implementation of Face recognition system using Ensemble Techniques.

487
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Association Rule Mining 9 Hour
The applications of Association Rule Mining: Market Basket, Recommendation Engines, etc. A mathematical model for association analysis; Large item sets; Association Rules, Apriori: Constructs large item sets
with mini sup by iterations; Interestingness of discovered association rules; Application examples; Association analysis vs. classification of FP-trees
T10: Implementation of Association Rule Mining in Real-time applications., T11: Implementation of Apriori Algorithm, T12: Building Frequent Pattern Tree for Classification
Unit-5 - Neural Networks 9 Hour
Neural Networks representations - McCulloch-Pitts units - Thresholding logic - Perceptron - Feed forward networks - multi-layer perceptron - Back propagation algorithms – Convergence and Hidden layer
representation in back propagation - Optimization Algorithms - Gradient Decent - Stochastic gradient - Adam, Adagrad - RMSProp - Drop out - Batch Normalization – Application Face recognition using - Neural
Networks
T13: Implementation of optimization algorithm, T14: Implementation of Back-Propagation Algorithm, T15: Building Face recognition system using Neural Networks

1. Kevin P. Murphy. Machine Learning: A Probabilistic Perspective. MIT Press 2012 4. William L. Hamilton, Graph Representation Learning, McGill University, 2020
2. Ian Goodfellow, Yoshua Bengio and Aaron Courville. Deep Learning. MIT Press 5. http://cs229.stanford.edu/
Learning
2016Perspective, “Second Edition”, CRC Press, 2014. 6. JasonBrownlee, ǁDeepLearningwithPythonǁ, ebook, 2016.
Resources
3. Ian Goodfellow, YoshuaBengio and Aaron Courville. Deep Learning. MIT Press 2016 7. Sebastian Raschka, VahidMirjilili, Python Machine Learning and deep learning, 2nd edition, kindle
book,2018

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. E Nagarajan, R&D Head, Solvedge Technology 1. Dr. Anandhakumar P Professor, Madras Institute of Technology, Chrompet 1. Dr.M.Lakshmi, SRMIST
2. Dr.A.Shobanadevi, SRMIST

488
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE426T FINANCIAL MACHINE LEARNING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the machine learning for the finance domain 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: know to the regression based supervised learning

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: explore the classification based supervised learning

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: explore the clustering based unsupervised learning

Environment &
Sustainability
CLR-5: understand the NLP concepts to study various case studies

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the machine learning approach to address finance domain - - - - - - - - - - - - - 1 -
CO-2: implement regression based supervised learning in finance - - - - - - - - - - - - - - 2
CO-3: implement classification based supervised learning in finance - - - - - - - - - - - - 2 - -
CO-4: implement clustering based unsupervised learning in finance - - - - - - - - - - - - - 2 -
CO-5: understand various case studies with NLP concepts - - - - - - - - - - - - - - 2

Unit-1 - Machine Learning in Finance 9 Hour


Machine Learning in Finance: Introduction to Machine Learning- Types of Machine Learning, NLP, Python packages for Machine Learning, Introduction and Installation, ANN models in Python-Keras-GPU and cloud
services
T1: Identifying Python packages for Machine Learning
T2: Implementing ANN models in python
T3: Using Keras to build Machine Learning models
Unit-2 - Supervised Learning: Regression 9 Hour
Supervised Learning- Model Performance-Model Selection-Regression: Time series models, Case Studies-Stock price prediction-Derivative Pricing-Investor Risk Tolerance and Robo-Advisors-Yield Curve
Prediction
T4: Using regression model to predict stock price
T5: Using regression model for derivative pricing
T6: Using regression model for yield curve prediction
Unit-3 - Supervised Learning: Classification 9 Hour
Supervised Learning: Classification-Case Studies- Fraud Detection-Loan Default Probability-Bitcoin Trading Strategy
T7: Using classification model for fraud detection
T8: Using classification model to identify loan default probability
T9: Using classification model for bitcoin trading strategy

489
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Unsupervised Learning: Clustering 9 Hour
Unsupervised Learning: Clustering – Clustering Techniques-Case Studies-Clustering for Pairs Trading-Portfolio Management: Clustering Investors-Hierarchical Risk Parity
T10: Using clustering model for Pairs trading
T11: Using clustering model for portfolio management
T12 Using clustering model for hierarchical risk parity
Unit-5 - Natural Language Processing 9 Hour
Natural Language Processing packages -Theory and concepts-Case Studies-NLP and Sentiment Analysis–Based Trading Strategies-Chatbot Digital Assistant- Document Summarization
T13: Implement sentiment analysis-based trading strategies using NLP
T14: Building simple chatbot digital assistant
T15 Building document summarization using NLP

1. Hariom Tatsat, Sahil Puri & Brad Lookabaugh (2021). Machine Learning & Data Science 4. Bob Mather (2018). Machine Learning in Finance: Use Machine Learning Techniques for
Blueprints for Finance-From Building Trading Strategies to Robo-Advisors Using Python, Day Trading and Value Trading in the Stock Market. Abiprod Pty Limited.
O’Reilly Media, ISBN: 9781492073055 5. German G. Creamer, Gary Kazantsev, and Tomaso Aste (2021). Machine Laerning and AI
Learning
2. Jannes Klaas (2019). Machine Learning for Finance. Publisher: Packt Publishing-ISBN: in Finance. Routledge, an imprint of the Taylor & Francis Group.
Resources
9781789136364 6. Wesley J.Chun,”Core Python Applications Programming,3rd ed,Pearson,2016
3. Matthew F. Dixon, Igor Halperin and Paul Bilokon (2020). Machine Learning in Finance:
From Theory to Practice. Springer Publication-ISBN: 9783030410674

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Vishwa Prasath T S, Technology Analyst 1. Mr.C.M.T.Karthikeyan, Asst. Professor, 1. Dr. P.Rajasekar, SRMIST
Accenture Pvt Ltd Government College of Engineering - Bargur

490
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE427T AUGMENTED AND VIRTUAL REALITY E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department Data Science and Business Systems Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learning various functions of Virtual Reality and Augmented Reality for 3D applications 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: exploring the the hardware and softwares for VR and AR for many applications

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: knowing about the challenges for implementation especially in VR and AR

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: utilities of hardware and software for closely real time usage for AR and VR

Environment &
Sustainability
CLR-5: explore the possibilities of brain computing interface with the applications of VR

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand AR and VR applications in real time - - - - - - - - - - - - - 1 -
CO-2: learn the requirements of Hardwares and softwares - - - - - - - - - - - - - 2 -
CO-3: analyse the Challenges in AR and VR - - - - - - - - - - - - - - 2
CO-4: create applications close to reality - - - - - - - - - - - - 2 - -
CO-5: create Brain Computer Interface with VR - - - - - - - - - - - - - - 1

Unit-1 - Applications of VR and AR 9 Hour


Virtual reality in industry, Augmented reality and industrial applications, VR-AR for industrial renewal, augmented reality, Computer-assisted surgery, Virtual reality and simulation for learning, Augmented reality and
intervention planning, Augmented reality in surgery, Current conditions and future prospects, Sustainable cities, Mobility aids in an urban environment, Building and architecture, Cities and urbanism, Towards
sustainable urban systems, Innovative, integrative and adaptive societies, Education, Arts and cultural heritages.
T1: VR and AR for Industrial applications , T2: Augmented Reality for building and architecture , T3: Sustainable solutions using AR and VR
Unit-2 - Hardwares and Softwares 9 Hour
Positioning and orientation devices, Restitution devices, Technological challenges and perspectives, software, developing 3D applications, Managing peripheral devices, Dedicated VR-AR software solutions, sensory-
motor actions for interaction, multisensory feedback, users and perception, Visual perception.
T4: Sensors for AR and VR, T5: Hardwares for AR and VR, T6: Softwares for AR and VR
Unit-3 - Challenges 9 Hour
Physical model and detecting collisions, Populating 3D environments: single virtual human to a surging crowd, the difficulty of making 3D interaction natural, the difficulty of synthesizing haptic feedback, the real–
virtual relationship in augmented reality, Acquisition and restitution equipment, Pose computation, Realistic rendering, Complexity and scientific challenges of 3D interaction, Complexity and challenges surrounding
the 3D interaction loop.
T7: Collisions in digital reality, T8: Synthesizing in digital reality , T9: Complexity in digital reality

491
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 – Close to Real World 9 Hour
Choosing a display device, Spatial localization, Topics in AR, Hybridization through a screen or HMD, Spatial augmented reality, Hybridization of the real world and the virtual world, Current evolutions, Presence in
augmented reality, Mixed reality, From mixed reality to mixed presence, Augmented reality, 3D interaction on tactile surfaces
T10: Head Mounted Display, T11: Hybridization of real world, T12: Tactile Stimulation
Unit-5 – Immersive Medium with Brain 9 Hour
Polymorphic immersive medium, promised experiences, Brain-computer interfaces, Working principle of BCIs, Current applications of BCIs, The future of BCIs, Alternative perceptions in virtual reality, Pseudo-
sensory feedback, Alternative perception of movement, Sensorimotor incoherences, Mitigation of the impact on visuo-vestibular incoherence
T13: Brain Computer Interface, T14: Alternative Perceptions, T15: Sensorimotor Incoherences

1. Bruno Arnaldi, Pascal Guitton, Guillaume Moreau, “Virtual Reality and Augmented Reality: Myths and 4. Jesse Glover, Jonathan Linowes – Complete Virtual Reality and Augmented
Realities”, ISBN: 978-1-786-30105-5 May 2018 Wiley-ISTE Reality Development with Unity: Leverage the power of Unity and become a pro
2. Jesse Glover, Jonathan Linowes – Complete Virtual Reality and Augmented Reality Development with at creating mixed reality applications. Packt publishing, 17th April 2019. ISBN -13
Learning Unity: Leverage the power of Unity and become a pro at creating mixed reality applications. Packt : 978-1838648183
Resources publishing, 17th April 2019. ISBN -13: 978-1838648183 5. Jonathan Linowes, Krystian Babilinski – Augmented Reality for Developers: Build
3. Jonathan Linowes, Krystian Babilinski – Augmented Reality for Developers: Build practical augmented practical augmented reality applications with Unity, ARCore, ARKit, and Vuforia.
reality applications with Unity, ARCore, ARKit, and Vuforia. Packt publishing, 9th October 2017. ISBN- Packt publishing, 9th October 2017. ISBN-13: 978-1787286436
13: 978-1787286436), “Retail Analytics: The Secret Weapon”, Wiley, ISBN- 978-1-118-09984-1

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Ravikumar, CEO 1. Prof. Indra kishor, Department of Computer Science and Engineering, 1. Dr. R. Rajkumar, SRMIST
Hackwit Technologies Pvt Ltd, Chennai. Poornima Institute of Engineering & Technology, Jaipur, Rajasthan.

492
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE428T HEALTHCARE ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: familiarize with Healthcare Data Analytics, EHR 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the technologies for analyzing Biomedical Image

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: familiarize with predictive modeling techniques for Clinical Data

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: familiarize with predictive analysis techniques for genomic data

Environment &
Sustainability
CLR-5: understand about NLP and Data mining for clinical text

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain knowledge on Healthcare Data Analytics, EHR - - - - - - - - - - - - - 1 -
CO-2: understand the technologies for analyzing Biomedical Image - - - - - - - - - - - - 2 - -
CO-3: apply predictive modeling techniques for Clinical Data - - - - - - - - - - - - 1 - 1
CO-4: apply predictive analysis techniques for genomic data - - - - - - - - - - - - - 2 -
CO-5: gain knowledge on NLP and Data mining for clinical text - - - - - - - - - - - - - 1 -

Unit-1 - An Introduction to Healthcare Data Analytics 9 Hour


Healthcare Data Sources and Basic Analytics- Advanced Data Analytics for Healthcare- Applications and Practical Systems for Healthcare- Resources for Healthcare Data Analytics- Electronic Health Records-
Components of HER- Coding Systems- Benefits of HER- Barriers to Adopting HER- Challenges of Using EHR Data
T1: Understanding HER, T2: Preprocessing of HER – Standardization, Data Cleaning, T3: Preprocessing of HER – Redundant data removal, Missing data
Unit-2 - Biomedical Image Analysis 9 Hour
Biomedical Imaging Modalities- Object Detection- Image Segmentation- Image Registration- Feature Extraction- Mining of Sensor Data in Healthcare- Mining Sensor Data in Medical Informatics- Challenges in
Healthcare Data Analysis- Sensor Data Mining Applications
T4: Biomedical Image Processing – enhancement, restoration, segmentation, Compression, T5: Biomedical Image Analysis Techniques – SIFT, RANSAC, CNN, T6: Biomedical Image - Visualization
Unit-3 - Predictive Models for Integrating Clinical and Genomic Data 9 Hour
Introduction- Issues and Challenges- Different Types of Integration- Different Goals of Integrative Studies- Validation- Information Retrieval for Healthcare- Knowledge-Based Information in Healthcare and
Biomedicine- Content of Knowledge-Based Information Resources- Indexing- Retrieval- Evaluation- Research Directions
T7: Patient prediction for Improved staffing, T8: Using healthcare data for Informed Strategic Planning - Part 1, T9: Using healthcare data for Informed Strategic Planning – Part 2
Unit-4 - Natural Language Processing and Data Mining for Clinical Text 9 Hour
Natural Language Processing- Mining Information from Clinical Text- Challenges of Processing Clinical Reports- Clinical Applications- Social Media Analytics for Healthcare- Social Media Analysis for Detection and
Tracking of Infectious Disease Outbreaks- Social Media Analysis for Public Health Research- Analysis of Social Media Use in Healthcare
T10: Classification and Clustering of Clinical Text Data, T11: Information Extraction and Entity Recognition of Clinical Text Data, T12: Ranking and word disambiguation of Clinical Text Data

493
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Advanced Data Analytics for Healthcare 9 Hour
Automated Decision Systems - The Artificial Intelligence field - Basic concepts of Expert Systems - Applications of Expert Systems - Structure of Expert Systems - Knowledge Engineering - Development of Expert
Systems – Location-based Analytics - Cloud Computing - Business Intelligence
T13: Dimensionality reduction for exploratory data analysis in daily medical research, T14: Analyzing the complexity of behavioral factors influencing WEIGHTS IN ADULTS – Part 1
T15: Analyzing the complexity of behavioral factors influencing WEIGHTS IN ADULTS – Part 2

Learning
1. Analytics in Healthcare-A Practical Introduction, Christo El Morr, Hossam Ali-Hassan, 2019 2. Healthcare Data Analytics, Charu C. Aggarwal
Resources

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. S. Santhosh, Manager of Team, Product Owner 1. Dr. M. Manikandan, Professor, MIT Campus, Anna University 1. Dr. T. Karthick, SRMIST

494
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE429T DATA SCIENCE FOR INTERNET OF THINGS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the basics of IoT analytics and the challenges involved in design of IoT 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the devices, protocols and standards involved in IoT systems

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


CLR-3: learn various real-world systems involving IoT sensor

Modern Tool Usage

Life Long Learning


complex problems
CLR-4: explore the smart applications development using IoT sensors and systems

Problem Analysis

Communication
Environment &
identify the possible applications in healthcare using IoT sensors and the IoT data analytics in this

Sustainability
CLR-5:
domain

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify the challenges involved in the design of IoT Analytics systems - - - - - - - - - - - - - 1 -
CO-2: understand the internals of IoT devices and the sensor networks - - - - - - - - - - - - - - 2
CO-3: design IoT Sensor networks for various real-world applications - - - - - - - - - - - - - 2 -
CO-4: develop smart applications using IoT sensors and analyse the data received from them - - - - - - - - - - - - 2 - -
CO-5: implement IoT healthcare systems and IoT Healthcare data analytical systems - - - - - - - - - - - - - - 2

Unit-1 - Defining IoT Analytics and Challenges 9 Hour


The situation - Defining IoT analytics - Defining analytics - Defining the Internet of Things - The concept of constrained - IoT analytics challenges - The data volume - Problems with time - Problems with space -
Data quality - Analytics challenges - Business value concerns
Unit-2 - IoT Devices, Networking Protocols and Standards for Internet of Things 9 Hour
IoT Devices-Healthcare-Manufacturing-Transportation and logistics-Retail-Oil and gas- - Home automation or monitoring - Wearables - Sensor types-IoT Data Link Protocols-Network Layer Routing Protocols -
Network Layer-Encapsulation Protocols -Session Layer Protocols-IoT Management Protocols-Security in IoT Protocols-IoT Challenges
Unit-3 - IoT Sensing, Mobile and Cognitive Systems 9 Hour
Sensing Technologies for Internet of Things - IoT Interactions with GPS, Clouds and Smart Machines - Radio Frequency Identification (RFID) - Sensors, Wireless Sensor Networks and GPS Systems - Cognitive
Computing Technologies and Prototype Systems – Problems
Unit-4 - Smart Applications IoT with Data Analytics 9 Hour
Defragmenting Intelligent Transportation: A Practical Case Study -Connected and Autonomous Vehicles-Transit Hub: A Smart Decision Support System for Public Transit Operations –
Smart Home Services Using the Internet of Things
Unit-5 - Case Studies in IoT Healthcare 9 Hour
Big Data Analytics for Healthcare and Cognitive Learning - Machine Learning for Big Data in Healthcare Applications - Healthcare Problems and Machine Learning Tools - IoT-based Healthcare Systems and
Applications, Emotional Insights via Wearables- Structural Health Monitoring-Home Healthcare and Remote Patient Monitoring

495
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Analytics for the Internet of Things (IoT) by Andrew Minteer, Released July 2017, 4. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Rob Barton and Jerome Henry, IoT
Publisher(s): Packt Publishing, ISBN: 9781787120730. Fundamentals: Networking Technologies, Protocols and Use Cases for Internet of Things,
Learning 2. Big-Data Analytics for Cloud, IoT and Cognitive Computing, Kai Hwang, Min Chen, ISBN: Cisco Press, 2017
Resources 978-1-119-24729-6 March 2017. 5. Arshdeep Bahga, Vijay Madisetti, Internet of Things – A hands-on approach, Universities
3. Internet of Things and Data Analytics Handbook,Hwaiyu Geng (Editor) - ISBN: 978-1-119- Press, 2015
17364-9 January 2017

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.I.Joe Louis Paul, Associate Professor, SSN College of Engineering 1. Dr K.Shantha Kumari, SRMIST

496
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE430T AUTOMATIC SPEECH RECOGNITION E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: utilize Language models with regular expressions 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the lexical analysis and neural networks in text processing

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the machine translation process and deep learning architecture for speech recognition

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: utilize information extraction and relation extraction applications

Environment &
Sustainability
CLR-5: construct Automatic speech recognitions applications using Chatbots

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand efficient text classification process - - - - - - - - - - - - - 1 -
CO-2: implement programs using the lexical analysis and neural networks in text processing - - - - - - - - - - - - 2 - -
CO-3: recognize the speech recognition models using deep learning architecture - - - - - - - - - - - - - 2 -
CO-4: model using information extraction - - - - - - - - - - - - - - 2
CO-5: implement ASR Applications with chatbots - - - - - - - - - - - - 2 - -

Unit-1 - Introduction to Speech and Language Processing 9 Hour


Knowledge in speech and language processing-ambiguity-models and algorithms: Regular expression-words, corpora-Text normalization-N Grams-Sampling sentences-smoothing techniques- Vector Semantics
and Embeddings, Lexical Semantics, Vector Semantics, Words and Vectors, TF-IDF: Weighing terms in the vector, word to vec, Visualizing Embeddings
T1. Regular expressions
T2. Text preprocessing methods using TF-IDF
T3. Implement Kneser-Ney Smoothing technique
Unit-2 - Introduction to Neural Predictive Networks 9 Hour
Fundamentals of Neural networks- Linked Predictive Neural Networks - Extensions - Weaknesses of Predictive Networks - Frame Level Training- word level training- and Neural Language Models- Advantages of
NN-HMM hybrids
T4 speech recognition experiment using LPNN
T5. Design and train a perceptron training for OR gate.
Unit-3 - RNN in Speech Recognition 9 Hour
Part-of-Speech Tagging, HMM Part-of-Speech Tagging, Rule based POS Tagging- RNN for Sequence Processing, Managing Context in RNNs: LSTMs and GRUs, Self-Attention Networks: Transformers ,Machine
Translation and Encoder-Decoder Models, Language Divergences and Typology, The Encoder-Decoder Model
T6. POS exercise
T7. Exercise for RNN scenario for HMM

497
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Computational Semantics and Semantic Parsing -Phonetics 9 Hour
Information Extraction, Relation Extraction, Relation Extraction Algorithms, Word Senses and WordNet, Word Senses, Relations Between Senses, Semantic Roles- Diathesis Alternations- FrameNet-Phonetics-
Articulatory Phonetics- Phonological Categories and Pronunciation Variation- Acoustic Phonetics and Signals
T8. Relation extraction process
T9. Frame net generation
T10. Simulation of original Lesk word overlap disambiguation algorithm
Unit-5 - Text to Speech Conversion 9 Hour
Automatic Speech Recognition and Text-to-Speech, The Automatic Speech Recognition Task, Feature Extraction for ASR: Log Mel Spectrum, Speech Recognition Architecture, CTC, and ASR Evaluation: Word
Error Rate, TTS.
T11.Text to speech conversion
T12.Log mel spectrum techniques
T13.Chatbot creation

1. Daniel Jurafsky and James H. Martin, "Speech and Language Processing", 3rd edition 3. Dong yu, Li Deng, Signals, and communications, “Automatic speech recgnition” A Deep Learning
draft, 2019 [JM-2019] approach, ISBN 978-1-4471-5779-3 (eBook)
2. Geoffrey Hinton, Li Deng, Dong Yu, George E. Dahl, Abdel-rahman Mohamed, 4. Speech Recognition using Neural Networks,Joe Tebelskis,”Speech and Language Processing:
Learning
Navdeep Jaitly, Andrew Senior, Vincent Vanhoucke, Patrick Nguyen, Tara N. Sainath, An Introduction to Natural Language Processing, Computational Linguistics, and Speech
Resources
and Brian Kingsbury, Deep Neural Networks for Acoustic Modeling in Speech Recognition“, Feb 2008
Recognition, IEEE Signal Processing Magazine, 29(6):82-97, 2012 5. Mark Gales and Steve Young, The application of hidden Markov models in speech recognition,
Foundations and Trends in Signal Processing, 1(3):195-304, 2008.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr D Hemavathi, SRMIST

498
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE447T ROBOT MOTION PLANNING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: acquire knowledge of Bug algorithms and configuration Space 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquire knowledge of Potential functions and Navigations

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


CLR-3: acquire knowledge of Sampling Algorithms

Modern Tool Usage

Life Long Learning


complex problems
CLR-4: gain knowledge of filtering techniques

Problem Analysis

Communication
Environment &
gain knowledge about Trajectory and Motion Planning and Design motion plan for Robot in the path

Sustainability
CLR-5:
specified

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply knowledge of Bug algorithms and configuration Space - - - - - - - - - - - - 2 - -
CO-2: apply knowledge of Potential functions and Navigations - - - - - - - - - - - - - 2 -
CO-3: apply knowledge of Sampling Algorithms - - - - - - - - - - - - - - 1
CO-4: gain knowledge of filtering techniques - - - - - - - - - - - - 1 - -
CO-5: gain knowledge about Trajectory and Motion Planning - - - - - - - - - - - - - - 2

Unit-1 - Introduction to Motion Planning and Bug Algorithms 9 Hour


Overview of Motion Planning - Bug1 And Bug 2, Tangent Bug, Implementation: The Tangent Line, Distance On Gradient, Continuation Method, Robot Configuration Specification,
Circular Mobile Robot, Two joint planer arm, Dimension Of The Configuration Space, Topology of configuration space: Homeomorphisms and Diffeomorphisms, Differentiable Manifolds,
Examples.
T1: Using Bug Algorithms implement Tangent Line, Distance and Gradient, Continuation Methods.
T2: Implementation of Configuration space
T3: Implementation of Matrix Representations of Rigid-Body Configuration
Unit-2 - Potential Functions and Roadmaps 9 Hour
Potential Function: Addictive Attractive/Repulsive Potential, Gradient Descent, Computing Distance From Implementation In The Plane, Local Minima Problem, Wave-Front Planner,
Navigation Potential Function: Sphere- Space Star-Space, Potential Functions for Rigid-Body Robots, Path Planning for Articulated Bodies, Visibility Graph, Deformation Retracts :
Generalized Voronoi Diagram, Retract-Like Structure: Generalized Voronoi Graph, Piecewise Retracts: The Rod Hierarchical Generalized Voronoi Graph Silhouette Methods.
T1: Using Potential Functions implementation of Mobile Robot
T2: Using GVD for deformation retracts
T3: Implementation using Silhouette Methods

499
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-3 - Sampling Based Algorithms 9 Hour
Probabilistic Road Maps: Basic PRM, Implementation of basic PRM, PRM sampling Strategies, PRM connection Strategies, Single-Query Sampling Based
Planners: Expensive Spaces Trees, Rapidly Exploring Random Trees, Connection Strategies and SBL Planner, Integration of Planners Sampling Based Roadmap, Analysis Of PRM,
Control based Planning, Multiple Robots, Manipulation Planning, Assembly Planning.
T1: Implementation of basic Probabilistic Road Maps
T2: Analysis of Probabilistic Road Maps
T3: Implementation of beyond Basic Path Planning
Unit-4 - Filtering 9 Hour
Linear Kalman Filtering - Kalman Filter: Example - Bayesian Methods: Localization - Basic Idea Probabilistic Localization - Probabilistic Localization As Recursive Bayesian Filtering -
Derivation Of Probabilistic Localization - Representation Of Posterior - Sensor Model - Mapping:: Mapping with known Locations - Bayesian Simultaneous Localization and Mapping
T1: Implementation of Linear Kalman Filtering for Dead Reckoning
T2: Implementation of Sensor Models
T3: Study of Bayesian Simultaneous Localization and Mapping
Unit-5 - Trajectory Planning 9 Hour
Trajectory Planning: Preliminaries - Decoupled Trajectory Planning - Direct Trajectory Planning: Optimal Control - Nonlinear Optimization - Grid-Based Search - Nonholonomic And
Underactuated Systems: preliminaries - Control Systems – Controllability - Motion Planning: Optimal Control - Steering Chained -Form Systems Using Sinusoids - Nonlinear Optimization
T1: Using Trajectory Planning Implement Grid Based Search algorithm
T2: Using Nonholonomic and Underactuated Systems Implement Simple Mechanical Control Systems
T3: Implementation of Motion Planning for Cars and Cars Pulling Trailers

1. HowieM.Choset, Seth Hutchinson, Kevin M.Lynch, George Kantor, Wolf ram Burgard, LydiaE. 2. Jean-Claude Latombe,"Robot Motion Planning", Springer Science & Business Media, 2012
Learning
Kavraki, Sebastian Thrun, "Principles of Robot Motion: Theory, Algorithms, and 3. http://robotics.stanford.edu/~latombe/cs326/2009/schedule.htm
Resources
Implementation".

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.A.Shanthini, SRMIST

500
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE448T BIO-INSPIRED COMPUTING AND FUZZY LOGIC E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the fundamentals of evolutionary theory 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: learn nature-inspired algorithms and the neural network systems

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: learn optimization algorithms for feature selection

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn the Genetic algorithm concepts

Environment &
Sustainability
CLR-5: become familiar with fuzzy logic techniques

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand basic concepts of evolutionary algorithm - - - - - - - - - - - - 2 - -
CO-2: implement nature-inspired algorithms and the basics of neural network concepts - - - - - - - - - - - - - 2 -
CO-3: implement the biological background of optimization algorithms - - - - - - - - - - - - - 1 -
CO-4: code for genetic algorithms concepts - - - - - - - - - - - - - - 2
CO-5: apply fuzzification and defuzzification concepts - - - - - - - - - - - - - 1 -

Unit-1 - Introduction to Evolutionary Algorithms 9 Hour


Introduction- Learning from Biology- Nature’s Way for Optimizing: Algorithm Meets Evolution, The Flavors of Evolutionary Algorithms - Dissecting an Evolutionary Algorithm: The Fitness Function, Initialization,
Selection, Recombination, Mutation, Replacement - Fields of Application of Evolutionary Algorithms
T1: Study of basic concepts of python programming
T2: Implementation of population concept
T3: Implementation of selection concept
Unit-2 - Nature-Inspired Algorithms 9 Hour
Simulated Annealing, Genetic Algorithms, Differential evolution, Ant and Bee Algorithms, Firefly algorithms, Cuckoo algorithms, Bat algorithm, Harmony search, Flower algorithms, Overview of Neural Networks
Models: Single and Multi-Layer Perceptron
T4: Implementation of Firefly Algorithm
T5: Implementation of Bat algorithm
T6: Implementation of single and multi-layer perceptron
Unit-3 - Optimization Algorithms 9 Hour
Optimization- Classical Optimization- Taxonomy of optimization problem- continuous optimization - Algorithms for continuous optimization: Unconstrained optimization - constrained optimization. Ant colony
optimization: Ant algorithms, ant system, Max min, Ant system. Particle Swarm Optimization- Properties of PSO, Discrete version, application.
T7: Implementation of Classical optimization
T8: Implementation of Ant colony optimization
T9: Implementation of particle swarm optimization
501
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Genetic Algorithms 9 Hour
History of Genetic Algorithm, Basic concepts- Creation of offspring, working principles, encoding, fitness function, reproduction, Genetic modeling- Inheritance operator, crossover, inversion & deletion, mutation
operator, Bitwise operator, Generational Cycle, Convergence of GA, Applications & advances in GA, Differences & similarities between GA & another traditional method, Hybrid systems, evolutionary computing,
Genetic Algorithm based on Backpropagation networks- Implementation and comparison on the performance of traditional algorithms with Genetic Algorithm
T10: Implementation of the fitness function
T11: Implementation of mutation and cross over
T12: Implementation of complete genetic algorithm
Unit-5 - Fuzzy Logic 9 Hour
Introduction to Fuzzy Logic-Fuzzy sets and membership functions-Operations on Fuzzy sets-Fuzzy relations, rules, propositions, implications, and inferences-Defuzzification techniques-Fuzzy logic controller design-
Some applications of Fuzzy logic.
T13: Implementation of fuzzy set operations
T14: Implementation of fuzzy logic functions (fuzzification and defuzzification)
T15: Implementation of fuzzy inference

1. Stephan Olariu, Albert Y. Zomaya (2006), Handbook of Bioinspired Algorithms and 3. George J. Klir (2015), Fuzzy Sets and Fuzzy Logic: Theory and Applications, Prentice Hall.
Learning Applications, Taylor & Francis Group, LLC. 4. Dennis Mou Ling Wong, Pan Zheng, Tao Song, Xun Wang (2019) Bio-inspired Computing
Resources 2. Wahde, M. (2008). Biologically Inspired Optimization Methods: An Introduction. United Models and Algorithms. Japan: World Scientific Publishing Company.
Kingdom: WIT Press.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.A Alkaff Ahamed, Software Developer Associate, Ceridian 1. Dr.L.Jayakumar, NIT Tripura 1. Dr.A.Shanthini, SRMIST

502
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE449T RISK ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn risk assessment, management, and analytics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: comprehend the functioning of Banking and apply analytic techniques to mitigate risks

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


CLR-3: explore the operations of Insurance sector

Modern Tool Usage

Life Long Learning


complex problems
analyze the processes involved in healthcare industry and use data analysis to improve patient care

Problem Analysis
CLR-4:

Communication
and optimize cost

Environment &
Sustainability
CLR-5: utilize human relationship management techniques for effective management of people

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand risk assessment, management, and analytics - - - - - - - - - - - - 1 - -
CO-2: understand the functioning of banking sector for risk mitigation - - - - - - - - - - - - 1 - -
CO-3: identify the operations of insurance sector and the associated risks - - - - - - - - - - - - 2 - -
CO-4: appreciate the processes used in healthcare for optimal services - - - - - - - - - - - - - 2 -
CO-5: effectively manage people using relationship management techniques - - - - - - - - - - - - - - 2

Unit-1 - Risk Introduction and Impacts 9 Hour


Risk Definition and Examples, Components and Factors, Understanding Risk Assessment, Risk Mitigation, Risk Management, Risk Analytics Introduction, Risk Analytics Definition and Objectives
T1: Discussion with case studies on impacts with risks
T2: Risk mitigation and management plan document
T3: Explore Risk Analytics
Unit-2 - Introduction to Banking Sector 9 Hour
Introduction to Banking Sector, National and International laws, Credit Risk Analytics, Internal capital Adequacy Assessment Process, Internal capital Adequacy Assessment Process Related Risk Analytics, Limit
Management, Risk-Adjusted Performance Management, Fraud Risk
T4: Compare national and international banking laws with case studies and papers
T5: Internal capital Adequacy Assessment Process Related Risk Analytics
T6: Risk-Adjusted Performance Management
Unit-3 - Introduction to Insurance Sector 9 Hour
Property & Causality Insurance Companies, Life Insurance Companies, Using Analytics for Customer Acquisition and Retention, Detecting Fraud, Preventing Fraud, Managing Fraud, Detecting, Preventing and
Managing Fraud using Analytics
T7: A comprehensive study on Insurance sector App
T8: Implementation of parsing RSS and HTML, pickling
T9: Fraud Handling using analytics

503
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Introduction to Healthcare Sector 9 Hour
HIPAA, Four Enterprise Disciplines of Health Analytics, Health Outcome Analysis, Customer Insights, Health Value and Cost, Actuary Services, Framework for Customer Analytics,
T10: A survey on healthcare standards – national and international
T11: Health Value, Cost and Outcome analysis
T12: Explore available frameworks for customer analytics
Unit-5 - Introduction to HR Analytics 9 Hour
Workforce Environment and Psychology, Talent Management, understanding retention, Predicting Retention, Boosting Employee Engagement, Sources of Hire, Quality of Hire, Profiling High Performers
T13: Analyze workforce Psychology and Talent Management
T14: Retention and employee engagement analytics
T15: Analyze hiring processes and profiling performers

1. Naeem Siddiqi, “Credit Risk Scorecards: Developing and Implementing Intelligent Credit 4. Jason Burke, “Health Analytics: Gaining the Insights to Transform Health Care”, John Wiley
Scoring”, ISBN 978-0-471-75451 Sons Inc., 2013, ISBN: 978-1-118-38304-9
Learning 2. Patrical L. Saporito, “Applied Insurance Analytics”, FT Press, 2015, ISBN-10:0-13-3760-36-7. 5. Jac Fitz-Enz, John R. Mattox II, “Predictive Analytics for Human Resources”, ISBN-13: 978-
Resources 3. Laura B. Madsen, “Data-Driven Healthcare: How Analytics and BI are Transforming the 8126552153.
Industry”, M.S. ISBN 978-1-118-77221-8 6. James C. Sesil, “Applying Advanced Analytics to HR Management Decisions: Methods for
Selection, Developing Incentives, and Improving Collaboration”, ISBN-13: 978- 0133064605

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.D.Rajeswari , SRMIST

504
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

UNDERGRADUATE/ INTEGRATED POST


GRADUATE DEGREE PROGRAMMES
(With exit option of Diploma)

(Choice Based Flexible Credit System)

Regulations 2021

Volume – 11L
(Syllabi for M.Tech (Integrated) Computer Science and
Engineering w/s in Cognitive Computing Programme
Courses)

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

505
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Core Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

506
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC505T COMPUTER GRAPHICS AND VISION C PROFESSIONAL CORE
Code Name Category 3 1 0 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce algorithms for line, circle, and ellipse 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: enumerate two dimensional geometric transformations and clipping operations

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: illustrate Three-dimensional object representations, transformation and viewing

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: articulate object recognition and feature detection

Environment &
Sustainability
CLR-5: discuss the applications of motion estimation

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: write algorithms for drawing line, circle, and ellipses 3 3 - - - - - - - - - - - - 1
CO-2: perform two dimensional geometric transformations 3 2 - - - - - - - - - - - - 1
CO-3: practice three dimensional geometric transformations 3 2 - - - - - - - - - - - - 2
CO-4: determine the models for object recognition and feature detection 3 2 - - - - - - - - - - - - 2
CO-5: interpret the models for motion estimation 2 2 - - - - - - - - - - - - 3

Unit-1 - Introduction 12 Hour


Output primitives – points and lines, line drawing algorithms, loading the frame buffer, line function; circle and ellipse generating algorithms; Pixel addressing and object geometry, filled area primitives. Attributes of
output primitives – Line attributes, curve attributes, Color and gray scale levels, Area fill attributes, Character attributes, and Bundled attributes, Inquiry functions, Antialiasing.
Tutorials: T1: Find out the algorithm for circle generation or curve generation. T2: How does anti-aliasing help to improve graphics?, T3: Identify the different animation functions based on the types of output
primitives.
Unit-2 - Two Dimensional Geometric Transformations 12 Hour
Matrix representations and homogeneous coordinates, composite transformations; Two-dimensional viewing – viewing pipeline, viewing coordinate reference frame; window-to-viewport coordinate transformation,
Two dimensional viewing functions; clipping operations – point, line, and polygon clipping algorithms.
Tutorials: T1: Write a code to get one image as input and apply all 2d transformations on the given image. T2: What are the different types of polygons and various polygon clipping algorithms?
T3: Write a program to make puzzle game.
Unit-3 - Three Dimensional Concepts 12 Hour
Three-dimensional object representations – Polygon surfaces- Polygon tables- Plane equations – Polygon meshes; Curved Lines and surfaces, Quadratic surfaces; Blobby objects; Spline representations – Bezier
curves and surfaces -B-Spline curves and surfaces. TRANSFORMATION AND VIEWING: Three dimensional geometric and modeling transformations – Translation, Rotation, Scaling, composite transformations;
Three-dimensional viewing – viewing pipeline, viewing coordinates, Projections, Clipping; Visible surface detection methods.
Tutorials: T1: Apply different 3d transformations on the given input image and show the result. T2: Given a bezier curve with 4 control points-B0 [1 0], B1 [3 3], B2 [6 3], B3 [8 1], Determine any 5 points lying on
the curve. Also, draw a rough sketch of the curve. T3: Write a code to implement projections in an image.

507
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Introduction to Computer Vision 12 Hour
Recognition - Instance Recognition – Image Classification – Object detection – Semantic segmentation - Feature detection and matching – Points and Patches – Edges and contour – Contour tracking – Lines and
Vanishing points. Case study - Pose estimation and Hand written recognition
Tutorials: T1: Write the different applications of computer vision. T2: Name the different feature detection and keypoints that can be used in person identification application. T3: How active contours are used in
different real time applications.
Unit-5 - Motion Estimation 12 Hour
Translational alignment – Parametric motion – Video stabilization – Spline based motion - medical image registration – Optical flow – Deep learning approaches – Rolling shutter wobble removal - Multi frame motion
estimation – Video denoising – Layered motion – Frame interpolation – Transparent layers and reflections – Video object segmentation – Video object tracking. Case study - Road Traffic Analysis and Autonomous
Vehicle.
Tutorials: T1: State the suitable deep learning approach in motion estimation algorithm. T2: Explore the different available AI video denoising softwares, T3: Identify the suitable CV algorithm used in autonomous
vehicle applications and list out its challenges.

Learning
1. Donald Hearn and M. Pauline Baker, “Computer Graphics C Version”, second edition, 2. Richard Szeliski,"Computer Vision: Algorithms and Applications",Springer,2010
Resources

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 10% - 20% -
Level 2 Understand 20% - 10% - 20% -
Level 3 Apply 30% - 40% - 30% -
Level 4 Analyze 30% - 40% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. [email protected] 1. Dr. Y.V.Lokeshwari - Associate Professor, SSN College of Engineering, Kalavakkam 1. Ms A L Amutha, SRMIST
2. [email protected] 2. [email protected]

508
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course COMPUTATION AND COGNITION: THE PROBABILISTIC Course L T P C
21CSC506J C PROFESSIONAL CORE
Code Name APPROACH Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the philosophical and psychological cognitive and generative approaches to modelling 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: analyze the basics of casual, conditional, and statistical dependence

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: acquire the computational and Bayesian models for cognition

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: implement the working pattern of cognitive architectures

Environment &
Sustainability
CLR-5: demonstrate the different cognitive architectures and cognitive robots

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
acquire the knowledge philosophical, and psychological approaches in cognitive models and generative
CO-1: - 1 - - - - - - - - - - - - 1
models
CO-2: illustrate casual, conditional, and statistical dependence - 2 - - - - - - - - - - - - 1
CO-3: demonstrate cognitive and Bayesian models - - 3 - - - - - - - - - - - 1
CO-4: apply knowledge on computational psycholinguistics - 2 - - - - - - - - - - - - 2
CO-5: design the cognitive robots and cognitive architectures - 2 - - - - - - - - - - - - 3

Unit-1 - Philosophical and Psychological 15 Hour


Introduction; Philosophical- Psychological - Cognitive approaches to modeling the mind, - Neuroscientific foundations - The Brain I - The Brain II - The Brain III - Brain Recording Techniques- Animal Cognition - The
relevance of computation; types of computation – Building Generative Models - Prediction, Simulation and Probabilities
Unit-2 - Casual, Conditional and Statistical Dependence 15 Hour
Causal and statistical dependence - Detecting Dependence Through Intervention - Graphical Notations for Dependence - Priori Dependence to Conditional Dependence - Non-monotonic Reasoning
Unit-3 - Cognitive and Bayesian Models 15 Hour
Symbolic representations and models of cognition - Debates about thinking, AI, and representation- Cognitive models and Bayesian inferencing - Bayesian models of cognition - Computational models of attention -
Visual Attention; Audio and Multimodal Attention
Unit-4 - Cognitive Science 15 Hour
Computational psycholinguistics-. Language and Cognitive Science - Language and Cognition - Word Processing - Cognitive architectures- cognitive system organization - Social Cognition – Communication and
Language
Unit-5 - Cognitive Robotics and Applications 15 Hour
Cognitive architectures; Cognitive robotics and embodied cognition - Applications: Audio quality assessment - compression & indexing - Applications: Image quality assessment, compression, Haptic interfaces-
Memorability of images; Haptic/tactile displays - Audio Engineering: Quality Assessment; Audio Engineering: Spatial Audio; Audio Engineering: Perceptual.

509
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Lab Experiments
Lab 1: Study the Retina Process Lab 8: Implement the Morphology Technique
Lab 2: Implement the Retina Computation Process Lab 9: Demonstrate the Part-of-Speech tagging
Lab 3: Demonstrate the Scene Statistics and Perception Lab 10: Implement the Parsing Technique.
Lab 4: Simulate the Intuitive Physics using Generative Model Lab 11: Demonstrate the Stochastic Parsing
Lab 5: Analyse the process of texture synthesis to artistic style transfer Lab 12: Demonstrate the Audio Synthesis
Lab 6: Demonstrate the Image Compression method Lab 13: Implement the Audio Processing
Lab 7: Implement and analyse the Tokenization/Lexicons/n-grams

1. Jay Friedenberg and Gordon Silverman. Cognitive Science: An Introduction to the Study 6. N. D. Goodman and A. Stuhlmüller (electronic). The Design and Implementation of Probabilistic
of Mind. SAGE Publications, 2006. Programming Languages. Retrieved 2022-8-16 from http://dippl.org.
2. E. Bruce Goldstein. Sensation and Perception. Wadsworth, 8th Edition, 2010. 7. Searle, John R. Minds, Brains, and Programs. Behavioral and Brain Sciences 3: 417–424
3. José Luis Bermúdez. Cognitive Science: An Introduction to the Science of the Mind. (1980) [doi: 10.1017/S0140525X00005756] [pdf].
Learning
Cambridge, 4th Edition, 2022. 8. Pinker, Steven. How the Mind Works. Penguin, 1999.
Resources
4. Matthew J. Traxler. Introduction to Psycholinguistics: Understanding Language Science. 9. Fodor, Jerry. The Mind Doesn't Work That Way: The Scope and Limits of Computational
Wiley- Blackwell, 2011. Psychology. MIT, 2000.
5. N. D. Goodman, J. B. Tenenbaum, and the ProbMods Contributors (2016). Probabilistic 10. Thomas L. Griffiths, Charles Kemp, and Joshua B. Tenenbaum. Bayesian models of cognition.
Models of Cognition (2nd ed.). Retrieved 2022-8-16 from https://probmods.org/ In Ron Sun (ed.), The Cambridge handbook of computational cognitive modeling (2008) [pdf]

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - - 10% 25% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 20% - - 30% 20% -
Level 4 Analyze 20% - - 30% 20% -
Level 5 Evaluate 10% - - 10% 10% -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr Vijay Daniel, Software Engineering Manager, 1. Dr D Sumathi, Professor, VIT-AP, Amaravathi 1. Dr S Prithi, SRMIST
MasterCard, Dublin, Ireland

510
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Elective Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

511
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course PROBABILISTIC GRAPHICAL MODELS: PRINCIPLES AND Course L T P C
21CSE541T E PROFESSIONAL ELECTIVE
Code Name TECHNIQUES Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline the ideas of probabilistic model used in probability theory, statistics, and machine learning 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate directed and undirected graphical models

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gain knowledge on Inference in exact, approximate inferences with algorithms

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: relate inference in MAP and temporal inference algorithms

Environment &
Sustainability
CLR-5: learn about different learning algorithms

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the fundamentals of probability theory 1 - - - - - - - - - - - 1 - -
CO-2: learn the directed and undirected graphical models with example algorithms 2 - - - - - - - - - - - - - 2
CO-3: understand the Inference in exact, approximate Inference with algorithms - - - 2 - - - - - - - - - - 2
CO-4: analyze the Inference in MAP and Temporal Inference with algorithms - - - 2 - - - - - - - - - - 2
CO-5: design different learning algorithms in graphical models - - - 3 - - - - - - - - - - 3

Unit-1 - Fundamentals 9 Hour


Fundamentals of Probability Theory - Views of Probability, Random Variables and Joint Distributions, Conditional Probability, Conditional Independence, Expectation and Variance, Probability Distributions - Conjugate
Priors, Introduction to Exponential Family; Fundamentals of Graph Theory - Paths, Cliques, Subgraphs, Cycles and Loops.
Unit-2 - Graphical Models 9 Hour
Introduction - Directed Models -Bayesian Network, Undirected Models -Markov Random Fields, Dynamic Models -Hidden Markov Model & Kalman Filters and Factor Graph; Conditional Independence -Bayes Ball
Theorem and D-separation, Markov Blanket, Factorization-Hammersley-Clifford Theorem, Equivalence: I-Maps & Perfect Maps; Factor Graphs - Representation, Relation to Bayesian Network and Markov Random
Field.
Unit-3 - Inference in Graphical Models 9 Hour
Exact Inference - Variable Elimination, Elimination Orderings, Relation to Dynamic Programming, Dealing with Evidence, Forward-Backward Algorithm, Viterbi Algorithm; Clique Tree Algorithm; Belief Propagation
(Sum Product); Approximate Inference - Variation Methods-Kikuchi & Bethe Approximation, Expectation Propagation, Gaussian Belief Propagation;
Unit-4 - Inference in MAP and Temporal 9 Hour
Max-Product, Graph Cuts, Linear Programming Relaxations to MAP: Tree-Reweighted Belief Propagation, MPLP; Sampling - Markov Chain Monte Carlo, Metropolis Hastings, Gibbs - Collapsing & Blocking, Case
study: Particle filtering applications.
Unit-5 - Learning in Graphical Models 9 Hour
Parameter Estimation - Expectation Maximization, Maximum Likelihood Estimation, Maximum Entropy, Pseudo likelihood, Bayesian Estimation, Conditional Likelihood, Structured Prediction; Learning with
Approximate Inference; Learning with Latent Variables; Structure Learning, Case Study-Structure Search.

512
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Koller, D. and Friedman, N. (2009). Probabilistic Graphical Models: Principles and Techniques. 4. Barber, D. (2011). Bayesian Reasoning and Machine Learning. Cambridge University
MIT Press. Press, 1st edition.
Learning 2. Jensen, F. V. and Nielsen, T. D. (2002). Bayesian Networks and Decision Graphs. Information 5. Wainwright, M. and Jordan, M. (2008). Graphical Models, Exponential Families, and
Resources Science and Statistics. Springer, 2nd edition. Variational Inference. Foundations and Trends in Machine Learning, 1:1–305.
3. Kevin P. Murphy (2013) Machine Learning: A Probabilistic Perspective. 4th Printing. MIT Press. 6. David Bellot (2016) Learning Probabilistic Graphical Models in R
7. Kiran R Karkera, (2014) Building Probabilistic Graphical Models with Python

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 40% - 40% -
Level 2 Understand 40% - 40% - 30% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze - - - - 10% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mrs.Savitha Boomiperumal, Technical Lead, 1. Dr.Anusha K, Associate Professor, 1. Dr.Sumathy G, SRMIST
Accenture Technology Solutions, Portugal, Europe School of Computing, VIT Chennai.

513
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE542T DEEP GENERATIVE MODELS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basics of generative models and deep learning architectures 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the significance of autoregressive and flow-based models

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: apply latent variable models for non-linear variables and to improve the performance

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand various basic generative adversarial networks for different applications

Environment &
Sustainability
CLR-5: explore deep GAN models for various multimedia applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain the knowledge on basic units of generative models and their types - 1 - - - - - - - - - - - - -
CO-2: implement autoregressive models and flow-based models with continuous and discrete random variables - 2 - 3 - - - - - - - - - - -
CO-3: learn the latent variable models and variational encoders - 3 - 3 - - - - - - - - - - 2
CO-4: develop the hybrid model and energy-based models for different applications - 3 - 3 - - - - - - - - - - 2
CO-5: apply various case studies that adapt deep GAN models - 2 - 3 - - - - 3 - - - - - 3

Unit-1 - Generative Modeling 9 Hour


Introduction - Generative Versus Discriminative Modeling - Advances in Machine Learning - The Rise of Generative Modeling - The Generative Modeling Framework – Probabilistic Generative Models - The
Challenges of Generative Modeling - Representation Learning -Setting Up Your Environment – Deep Learning – Structural and unstructural data – Deep Neural Network – Example – Improving model.
Unit-2 - Deep Generative Modelling 9 Hour
Types – Autoregressive models - Autoregressive Models Parameterized by Neural Networks - Deep Generative Autoregressive Model: an example Flow based models - Flows for Continuous Random Variables -
Change of Variables for Deep Generative Modeling - Building Blocks of RealNVP – example - Flows for Discrete Random Variables - Flows in R or Maybe Rather in Z - Integer Discrete Flows. Case study using
Deep generative modeling
Unit-3 - Latent Variable Models 9 Hour
probabilistic principal component analysis - Variational Auto-Encoders: Variational Inference for Non-linear Latent Variable Models - Improving Variational Auto-Encoders - Hierarchical Latent Variable Models.
Unit-4 - Hybrid Modeling and GAN 9 Hour
Naïve approach – shared parameterization approach – example – Energy based models – model formation – training – example – restricted Boltzmann machines Generative adversarial networks – GAN architecture
– GAN challenges – Wassertein GAN – WGAN – GP. Case study using Hybrid approach with GAN
Unit-5 - Future of Generative Modelling 9 Hour
the transformer – advances in image generation – applications of generative modelling
Case studies – BERT – GPT-2- MuseNet – ProGAN – SAGAN – BigGAN – StyleGAN – AI Art – AI Music

514
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. David Foster, Generative Deep Learning, Teaching Machines to Paint, Write, Compose, and 4. Roozbeh Razavi-Far, Ariel Ruiz-Garcia, Vasile Palade, Juergen Schmidhuber,
Play, O'Reilly Media, Inc., 2019, ISBN: 9781492041948 Generative Adversarial Learning: Architectures and Applications, (2022), Springer Cham
Learning 2. Jakub M. Tomczak, Deep Generative Modeling, Springer nature, Edition 1, 2022, ISBN - 978- 5. Jakub M. Tomczak, Deep Generative Modeling, Springer, 2022, 978-3-030-93158-2
Resources 3-030-93157-5
3. Kailash Ahirwar, Generative Adversarial Networks Projects, build next-generation generative
models using TensorFlow and Keras, pakt publisher, 2019. ISBN: 978-1789136678

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 30% - 30% -
Level 2 Understand 30% - 30% - 30% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 10% - 10% - 10% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100% 100% 100%

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mrs.Kavita Ganeshan Artificial Intelligence Principal - AI Products and 1. Dr. S. Chandrakala, Professor, 1. Dr. A. Robert Singh, SRMIST
Solutions, Accenture, Mumbai, India School of Computing, Sastra Deemed to be University, Thanjavur

515
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course BRAIN MACHINE INTERFACE: SCIENCE, TECHNOLOGY AND Course L T P C
21CSE543T E PROFESSIONAL ELECTIVE
Code Name APPLICATION Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic concepts of brain computer/machine interface 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: study the various signal acquisition methods of Brain Machine/Computer Interface

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: interpret signal processing methods used in Brain Machine/Computer Interface

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the various machine learning methods of Brain Machine/Computer Interface

Environment &
Sustainability
CLR-5: learn the various applications of Brain Machine/Computer Interface

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: summarize the Brain Machine /Computer Interface 2 1 - 2 - - - - - - - - 1 - -
CO-2: assess concept of BCI 2 1 - 2 - - - - - - - - - 1 -
CO-3: assign functions appropriately to the human and to the machine 3 1 - 2 - - - - - - - - 1 - -
CO-4: choose appropriate feature extraction methods 2 1 - 3 - - - - - - - - - 1 -
CO-5: apply machine learning algorithms for translation 3 2 - 3 - - - - - - - - - - 3

Unit-1 - Introduction to BCI 9 Hour


Introduction - Brain structure and function, Brain Computer Interface Types - Synchronous and Asynchronous -Invasive BCI -Partially Invasive BCI - Non Invasive BCI, Structure of BCI System- BCI Monitoring
Hardware, EEG, ECoG, MEG, fMRI-10-20 electrode positions.
Unit-2 - Brain Activation 9 Hour
Brain activation patterns - Spikes, Oscillatory potential and ERD, Slow cortical potentials, Movement related potentials-Mu rhythms, motor imagery, Stimulus related potentials - Visual Evoked Potentials – P300 and
Auditory Evoked Potentials, Potentials related to cognitive tasks.
Unit-3 - Feature Extraction Methods 9 Hour
Data Processing – Spike sorting, Frequency domain analysis, Wavelet analysis, Time domain analysis, Spatial filtering -Principal Component Analysis (PCA), Independent Component Analysis (ICA), Artefacts
reduction, Feature Extraction - Phase synchronization and coherence. Case study : Application of Feature extraction methods
Unit-4 - Machine Learning Methods for BCI 9 Hour
Classification techniques –Binary classification, Ensemble classification, Multiclass Classification, Evaluation of classification performance, Regression - Linear, Polynomial, RBF’s, Perceptron’s, Multilayer neural
networks, Support vector machine, Graph theoretical functional connectivity analysis. Case study: Machine learning methods in BCI applications.
Unit-5 - Applications of BCI 9 Hour
Invasive BCIs: decoding and tracking arm (hand) position, controlling prosthetic devices such as orthotic hands, Cursor and robotic control using multi electrode array implant, Cortical control of muscles via functional
electrical stimulation. Non-invasive BCIs: P300 Mind Speller, Visual cognitive BCI, Emotion detection. Ethics of Brain Computer Interfacing.

516
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Rajesh.P.N.Rao, “Brain-Computer Interfacing: An Introduction”, Cambridge University Press, First 5. Ali Bashashati, MehrdadFatourechi, Rabab K Ward, Gary E Birch,” A survey of signal
edition, 2019. Processing algorithms in brain–computer interfaces based on electrical brain signals”
2. Jonathan Wolpaw, Elizabeth Winter Wolpaw, “Brain Computer Interfaces: Principles and practice”, Journal of Neural Engineering, Vol.4, 2007, PP.32-57.
Learning Oxford University Press, USA, Edition 1, January 2012. 6. Arnon Kohen, “Biomedical Signal Processing”, Vol I and II, CRC Press Inc, Boca
Resources 3. Ella Hassianien, A &Azar.A.T (Editors), “Brain-Computer Interfaces Current Trends and Rato, Florida.Bishop C.M., “Neural networks for Pattern Recognition”, Oxford,
Applications”, Springer, 2015. Clarendon Press, 1995.
4. Bernhard Graimann, Brendan Allison, GertPfurtscheller, "Brain-Computer Interfaces: 7. Andrew Webb, “Statistical Pattern Recognition”, Wiley International, Second Edition,
Revolutionizing Human-Computer Interaction", Springer, 2010 2002.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 30% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.M.Prakash Team Lead(Associate Consultant) , 1. Dr.V Haribaabu Associate Faculty in Entrepreneurship Development 1. Dr.M.Uma, SRMIST
Virtusa ,Chennai Institute of India Gandhi Nagar, Gujarat.

517
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE544T DATA ANALYSIS AND VISUALIZATION C PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basics of data analytics and essential tools 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: apply the preprocessing methods to prepare the data for data analytics

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: utilize various data visualization tools for understanding the insights of data

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: analyze time-series data and its structure for making prediction

Environment &
Sustainability
CLR-5: apply advanced data analytic tools for real time applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: use data analysis tools in the panda’s library 1 - - 3 - - - - - - - - 2 - -
CO-2: load, clean, transform, merge, and reshape data - - - 3 - - - - - - - - 3 - -
CO-3: handle various data visualization tools - - - 3 - - - - - - - - - 1 -
CO-4: analyze and manipulate time series data - - - 3 2 - - - - - - - - - 2
CO-5: solve real world data analysis problems - - - 3 2 - - - - - - - - - 3

Unit-1 - Introduction 9 Hour


Introduction to Data Science, Exploratory Data Analysis and Data Science Process. Motivation for using Python for Data Analysis, Introduction of Python shell iPython and Jupyter Notebook.
Unit-2 - Started with Pandas 9 Hour
Arrays and vectorized computation, Introduction to pandas Data Structures, Essential Functionality, Summarizing and Computing Descriptive Statistics. Data Loading, Storage and File Formats. Reading and writing
Data in Text Format, Web Scraping, Binary Data Formats, Interacting with Web APIs, Interacting with Databases Data Cleaning and Preparation. Handling Missing Data, Data Transformation, String Manipulation
Case study: Understanding the data thoroughly using APIs
Unit-3 - Data Wrangling 9 Hour
Hierarchical Indexing, Combining and Merging Data Sets Reshaping and Pivoting.
Data Visualization matplotlib: Basics of matplotlib, plotting with pandas and seaborn, other python visualization tools - Plotnine, geoplotlib
Unit-4 - Data Aggregation and Group Operations 9 Hour
Group by Mechanics, Data aggregation, General split-apply-combine, Pivot tables and cross tabulation
Time Series Data Analysis: Date and Time Data Types and Tools, Time series Basics, date Ranges, Frequencies and Shifting, Time Zone Handling, Periods and Periods Arithmetic, Resampling and Frequency
conversion, Moving Window Functions.
Unit-5 - Advanced Pandas 9 Hour
Categorical Data, Advanced GroupBy Use, Techniques for Method Chaining, Case studies: mining text data, analyze image dataset, analyze social network data set

518
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. McKinney, W. (2017). Python for Data Analysis: Data Wrangling with Pandas, 3. Anil Maheshwari, Data Analytics, 1st Edition (2017), TataMcGraw Hill
Learning NumPy and IPython. 2nd edition. O’Reilly Media 4. Dr. Ossama Embarak, Data Analysis and Visualization Using Python, Springer (2018).
Resources 2. O’Neil, C., & Schutt, R. (2013). Doing Data Science: Straight Talk from the 5. Avinash Navlani, Armando Fandango, Ivan Idris, Python Data Analysis, Packt publisher, 2021,
Frontline O’Reilly Media 9781789955248

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 30% - 30% -
Level 2 Understand 30% - 30% - 30% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100% 100% 100%

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.R. Praveen Kumar, Technical lead, Allianz Technology, 1. Dr. N. Sudha, Professor, 1. Dr. A. Robert Singh, SRMIST
Thiruvananthapuram, Kerala. School of Computing, Sastra Deemed to be University, Thanjavur

519
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE545T COMPUTATIONAL PERCEPTION AND COGNITION E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce the computational models, and perception of cognition 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate the basic parameter estimation techniques

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: introduce the bayesian parameter estimation techniques and Hierarchical modeling

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: relate the different computational models

Environment &
Sustainability
CLR-5: analyze the models in psychology

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the computational models, and Cognition - - - 2 - - - - - - - - - - -
CO-2: apply the basic parameter estimation techniques - - 3 2 - - - - - - - - - - -
CO-3: interpret the bayesian parameter estimation techniques and Hierarchical modeling - - - 3 - - - - - - - - - - -
CO-4: compare the different computational models - - 3 3 - - - - - - - - - - 3
CO-5: analyze the models in psychology - - - 3 - - - - - - - - - - -

Unit-1 - Introduction to Modeling 9 Hour


Introduction to Modeling: Models and Theories in Science - Quantitative Modeling in Cognition - Potential Problems: Scope and Falsifiability from Words to Models: Response Times in Speeded-Choice Tasks -
Building a Simulation - The Basic Toolkit
Unit-2 - Basics Parameter Estimation 9 Hour
Basic Parameter Estimation Techniques- Discrepancy Function- Fitting Models to Data: Parameter Estimation Techniques- Least-Squares Estimation in a Familiar Context- Inside the Box: Parameter Estimation
Techniques- Variability in Parameter Estimates - Maximum Likelihood Parameter Estimation- Basics of Probabilities- Defining a Probability Distribution- Finding the Maximum Likelihood Combining Information from
Multiple Participants
Unit-3 - Parameter Estimation 9 Hour
Bayesian Parameter Estimation- Bayesian Inference- Analytic Methods for Obtaining Posteriors- Determining the Prior Distributions of Parameters- Markov Chain Monte Carlo Methods- Problems Associated with
MCMC Sampling- Gibbs Sampling - Multilevel or Hierarchical Modeling- Conceptualizing Hierarchical Modeling- Bayesian Hierarchical Modeling- Hierarchical Maximum Likelihood Modeling.
Unit-4 - Model Comparison 9 Hour
Psychological Data and the Very Bad Good Fit- Model Comparison- The Likelihood Ratio Test- Akaike’s Information Criterion- Other Methods for Calculating Complexity and Comparing Models- Parameter
Identifiability and Model Testability Bayesian Model Comparison using Bayes Factors: Marginal Likelihoods and Bayes Factors- Methods for Obtaining the Marginal Likelihood- Bayes Factors for Hierarchical Models-
The Importance of Priors. Case study on Model comparison.

520
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Models in Psychology 9 Hour
Models in Psychology: Broad Overview of the Steps in Modeling- Drawing Conclusions from Models- Good Practices to Enhance Understanding and Reproducibility Neural Network Models- Hebbian Models-
Backpropagation Models in Neuroscience- Methods for Relating Neural and Behavioral Data- Reinforcement Learning Models- Neural Correlates of Decision-Making. Case study: Applications of Cognition towards
model building.

1. Computational Modeling of Cognition and Behavior, Simon Farrell and Stephan 4. Emmanuel M. Pothos, Andy J. Wills, Formal Approaches in Categorization, Cambridge University
Lewandowsky, Cambridge University Press, 2018 Press, 2011
2. Jerome R. Busemeyer, Zheng Wang, James T. Townsend, Ami Eidels (ed.), The 5. Ron Sun (ed.), The Cambridge Handbook of Computational Psychology, Cambridge University
Learning
Oxford Handbook of Computational and Mathematical Psychology, Oxford University Press, 2008
Resources
Press, 2015 6. Nils J. Nilsson, The Quest for Artificial Intelligence, Cambridge University Press, 2009
3. Jerome R. Busemeyer, Peter D. Bruza, Quantum Models of Cognition and Decision, 7. Bernard J. Bears, Nicole M. Gage, Cognition, Brain and Consciousness: Introduction to Cognitive
Cambridge University Press, 2014 Neuroscience (2010), Academic Press, 2010

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 30% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Guruprasad Lakshmanan, Chief Technology Officer, 1. Dr. B.Sathish Babu, Professor, Department of AI & ML, RV College of 1. Dr. M. Uma, SRMIST
Twice Group & Blocksrus, Chennai Engineering, Bengaluru, Karnataka

521
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE546T MEDICAL SIGNAL PROCESSING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic concepts of signals and frequency-based transforms 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the basics of digital filters

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: investigate the events in the signal and interpret the basic architecture of the processor

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: study of spectral and cross-spectral features of electrocardiographic signals

Environment &
Sustainability
CLR-5: interpret the basic architecture of the DSP processor and its applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: comprehend and analyse the signals in different statistical methods 1 - - - - - - - - - - - 1 - -
CO-2: gain the transforms enactments on bio-signal - - 2 - - - - - - - - - - - 2
CO-3: comprehend the implementations of filters in biosignals - - 2 - - - - - - - - - - - 2
CO-4: ecg signal analysis and modelling - - 2 - - - - - - - - - - - 2
CO-5: familiarize the digital signal processors and its application in medical fields - - 3 - - - - - - - - - - - 3

Unit-1 - Introduction to Signal Processing 9 Hour


Z transform introduction, definition, convergence. Inverse Z transforms, Analysis of discrete-time systems using Z transforms. Solutions of differential equations. Transfer functions and stability.
Unit-2 - Time-Frequency Domain Analysis 9 Hour
Fourier transforms for continuous signals. Energy spectrum, Properties (without proof), Gibbs phenomena, Auto and cross-correlation. Discrete Fourier transforms. Properties (without proof), Inverse DFT, introduction
to FFT.
Unit-3 - Digital Filters 9 Hour
Types of artefacts and noise - Time domain filters, frequency domain filters, notch and comb filters, optimal filtering, adaptive filters - Signal decomposition-based filtering.
Unit-4 - Event Detection and Feature Extraction Techniques 9 Hour
Signal segmentation - Envelop extraction and analysis, temporal, spectral, statistical, information theoretic and cross spectral features - Waveform complexity. Case Studies: Estimating fractal connectivity with an
application to neurophysiological signals, Cross spectral analysis of electrocardiographic signals.
Unit-5 - Digital Signal Processors 9 Hour
Introduction, General purpose DSP processors, architecture, hardware configuration, software development tools - Implementation considerations. TMS 320 Family of DSP Processors-Architecture - Functional units
- Pipelining-Registers - Linear and Circular addressing - Types of instructions - Sample Programs - Real Time Implementation on DSP processors. Case Studies: - Linear Discrimination-Detection of motor activity
from EMG, Harmonic analysis - Estimation of heart rate in ECG - Auto-regressive model - Estimation of spectrum of thoughts in EEG

522
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Digital signal processing, Proakis (PHI) 6. Malmivuo, J. and Plonsey, R. Bioelectromagnetism: Principles and Applications of Bioelectric
2. Rangaraj M. Rangayyan, “Biomedical Signal Analysis”, 2015, 2nd Edition, WileyIEEE and Biomagnetic Fields, Oxford University Press, New York, 1995.
Learning Press, New 7. Rulph Chassaing, “Digital Signal Processing and Applications with the C6713 and C6416 DSK”,
Resources 3. Signal Analysis by R. P. Singh, Second edition Tata McGraw – Hill 2012, 1st Edition, Wiley, New York.
4. Engineering Electronics by Mauro R Prentice – Hall 8. Nasser Kehtarnavaz, “Real Time Signal Processing Based on TMS320C6000”, 2011, 2nd
5. D C Reddy, McGraw Hill, Biomedical Signal Processing. Edition, Elsevier, Netherlands.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 40% - 40% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. K. Selvaraj, Caterpillar, Bangalore 1. Dr. S.Shoba, VIT, Chennai 1. Dr.R.Athilakshmi, SRMIST
2. Dr.R.Rajavel,ECE,SSN College of Engineering, Chennai

523
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE547T DEEP MULTITASK AND META LEARNING C PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: acquire knowledge in Multitask learning and Meta learning 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: gain knowledge in Optimization algorithms and dimensionality reduction

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: acquire knowledge in neural network approach to pattern recognition

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: acquire knowledge in Transfer learning and Sequential Models

Environment &
Sustainability
CLR-5: understand the principles of unconstrained optimization

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: explore Multitask learning and Meta learning 3 3 - - - - - - - - - - 1 - 2
CO-2: compare the optimization algorithms and high dimensional data using reduction techniques 3 2 - - - - - - - - - - - - 2
CO-3: explore various approaches to identify the patterns 3 2 - - - - - - - - - - - - 2
CO-4: apply RNN and transfer learning to real world scenarios 3 2 - - - - - - - - - - - - 3
CO-5: acquire the principles of unconstrained optimization 2 2 - - - - - - - - - - - - 1

Unit-1 - Introduction and Start of Multi-Task Learning 9 Hour


Multi-task learning- Single task learning, Multi task classification, Image Net classification with deep convolution neural networks, Task conditioning, Alternative view on Multi task Architecture- concatenation based
conditioning, Additive conditioning, Multi head architecture, Multiplicative Conditioning, Multi label learning T1: Multi – Task learning, T2: Multi -Transfer learning, T3: Fine tuning.
Unit-2 - Meta-Learning Structure 9 Hour
Meta learning Advantages, Bayesian meta-learning approaches: black-box approaches, optimization-based meta-learning, metric learning), Non-Parametric Few-Shot Learning: Siamese networks, matching
networks, prototypical networks Embed, nearest neighbours. T4: Properties of Meta-Learning Algorithms, T5: Meta-features for meta-learning, T6: Federated and Meta learning over Non-Wireless and Wireless
Networks
Unit-3 - Advanced Meta-Learning Topics 9 Hour
Stacking Generalization, Meta learning approaches and its applications, meta-overfitting, unsupervised meta-learning, Bayesian models, Multi-task RL, goal-conditioned RL, Meta-reinforcement learning, hierarchical
RL. T7: Example of Meta-Learning Applications - Imitation learning, T8: Example of Meta-Learning Applications-Drug discovery, motion prediction, T9: Example of Meta-Learning Applications- language generation.
Unit-4 - Optimization-Based Meta-Learning 9 Hour
Unconstrained Optimization and Neural Networks, Single-Neuron Training, Backpropagation Algorithm, Genetic Algorithms, Chromosomes and Representation Schemes, Selection and Evolution. T10: Hessian in
Meta Learning, T11: The Rank One Correction Formula, T12: Analysis of Genetic Algorithms
Unit-5 - Dynamic Meta Learning 9 Hour
Prototypical clustering Networks for Dermatological Image Classification, selecting models for forecasting stationary time series. T13: Real-Number Genetic Algorithms, T14: Dynamic meta-learning for failure
prediction in large-scale systems, T15:Dynamic Alignment via Meta-filter for Few-shot Learning

524
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Eugene Charniak, Introduction to Deep Learning, MIT Press, 2018. 4. Edwin K.P. Chong, Stanislaw H. Zak, An Introduction to Optimization, Wiley-
Learning 2. Robert J, Schalkoff, and Pattern Recognition: Statistical, Structural and Neural Approaches, John Interscience, Second edition
Resources Wiley & Sons Inc., New York, Reprint 2014. 5. Dimitri P. Bertsekas, Nonlinear Programming, MIT, Second Edition
3. Fukunaga, Introduction to Statistical Pattern Recognition, second edition, Academic press, 2013. 6. https://cs330.stanford.edu/lecture_slides/cs330_nonparametric_2022.pdf.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 30% - 30% -
Level 2 Understand 40% - 40% - 30% -
Level 3 Apply 20% - 30% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.M.Vivekanandan,Nokia 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr.N.Meenakshi, SRMIST
2. Mr.SanthoshKumar,CTS 2. Mr.Syedthouheed,Reva University, Bangalore

525
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE548T SPATIAL AND TEMPORAL COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline the ideas of traditional relational data and spatial data 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate the basics of spatial databases

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gain knowledge on spatial data models

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: gain knowledge on Spatio-Temporal computing Techniques

Environment &
Sustainability
CLR-5: learn about different Application programming Interfaces

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: illustrate the concepts of traditional relational data and spatial data - 2 - - - - - - - - - - - - -
CO-2: learn the spatial databases - 2 2 - - - - - - - - - - 1 -
CO-3: understand the spatial data models - 2 - - - - - - - - - - - 1 -
CO-4: analyze Spatio-Temporal computing Techniques - - 2 - 2 - - - - - - - - 2 -
CO-5: analyze various Application programming Interfaces - 2 - - 2 - - - - - - - - - 2

Unit-1 - Introduction to Spatio Temporal Data 9 Hour


Representation of Spatio temporal data, Visualization of Spatio-Temporal Data – Spatial plots – Time series plots - Hovmoller plot – Interactive plots, Visualizing large spatial temporal datasets –Visualizing
Uncertainity- Exploratory Analysis of Spatio-Temporal Data - Empirical Spatial Means and Covariances - Spatio-Temporal Covariograms and Semivariograms - Empirical Orthogonal Functions (EOFs) - Spatio-
Temporal Canonical Correlation Analysis
Unit-2 - Introduction to Spatial Databases 9 Hour
Requirements, Principles, and Concepts for Spatial Database Management Systems (SDBMS) – Spatial Databases and Geographic Information Systems SDBMS and GIS Applications. Spatial networks: conceptual,
logical and physical level design issues, Spatial networks Query: shortest path from a start-point to a destination, shortest route to deliver packages to a set of homes, Query processing in spatial network databases.
Unit-3 - Models for Spatial Data: Geographic Space Modelling 9 Hour
Representation Models – Geometry of Collection of Objects – Vector Data – Raster Data. Modelling Spatial Data. Spatial Access Methods (SAM): Issues in SAM Design – Space Driven Structures versus Data
Driven Structures – The Grid File – Quadtree and Variants – R-Tree and Variants – k-d-B Tree. Case study- SAM Cost Models
Unit-4 - Spatio-Temporal Computing 9 Hour
Techniques of spatial and temporal analysis, point patterns, spatio - temporal database applications. Geostatistics, spectral analysis, wavelet analysis, interpolation, and mapping. Spatial information services: virtual
globes, location-based services, Case study-Enterprise consulting service.
Unit-5 - Application Programming Interfaces 9 Hour
HTML5 Geolocation API, Google Maps API, Bing Maps API, Maps SDK, Flickr location API, Twitter location API, OSHDB: a framework for spatio-temporal analysis of OpenStreetMap history data.

526
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Christopher K. Wikle, Andrew Zammit-Mangion, Noel Cressie, Spatio Temporal 4. Narayan Panigrahi, Computing in Geographic Information Systems, CRC press, 2014.
Statistics with R, CRC Press, 2019. 5. Shashi Shekhar and Sanjay Chawla “Spatial Databases: A Tour “Pearson.
Learning
2. Philippe Rigaux, Michel Scholl, Agnes Voisard, “Spatial Databases with Applications to 6. Evangelos Petroutsos, Google Maps: Power Tools for maximizing the API, McGraw-Hill, 2014.
Resources
GIS”, Morgan Kaufman, 2002. 7. Noel Cressie, Christopher K. Wikle, Statistics for Spatio-Temporal data, Wiley, 2015.
3. Shashi Shekhar, Pamela Vold, Spatial Computing, The MIT Press, 2020.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 40% - 40% -
Level 2 Understand 40% - 40% - 30% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze - - - - 10% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mrs.Savitha Boomiperumal, Technical Lead, Accenture 1. Dr.Anusha K, Associate Professor, School of Computing, VIT 1. Dr.Sumathy G, SRMIST
Technology Solutions, Portugal, Europe Chennai.

527
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE549T DECISION MAKING UNDER UNCERTAINTY C PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn and identify the opportunities for creating value using these models 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: develop models that can be used to improve decision making under uncertainty within an organization

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: sharpen their ability to structure problems and to perform logical analyses

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: know how to assess the significance of model outputs for managerial insights and action

Environment &
Sustainability
CLR-5: develop the skills to identify, define, scope, model, and analyze complex decision problems

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
gain a broad fundamental understanding of the mathematical models and solution methods for decision
CO-1: - 3 1 - - - - - - - - - 1 - -
making
CO-2: implement and extend key algorithms for learning and decision making - 3 2 - - - - - - - - - - - 2
CO-3: identify an application of the theory and formulate it mathematically - 3 - 2 - - - - - - - - - - 2
CO-4: gain a deep understanding of an area of particular interest and apply it to a problem - 3 - 2 - - - - - - - - - - 3
CO-5: make inferences about a management problem based on the solution of a model - 3 - 2 - - - - - - - - - - 2

Unit-1 - Probabilistic Reasoning 9 Hour


Introduction-Degrees of Belief and Probability-Probability Distributions-Bayesian Networks-Inference in Bayesian Networks- Inference in naïve Bayes Models-Direct Sampling-Gibbs Sampling-Inference in Gaussian
Models-Bayesian Parameter Learning-Nonparametric Learning-Learning with Missing Data-Bayesian Network Scoring-Directed Graph Search-Markov Equivalence Classes-Partially Directed Graph Search-Simple
Decisions-Constraints on Rational Preferences-Utility Functions-Utility Elicitation-Maximum Expected Utility Principle-Decision Networks.
Unit-2 - Sequential Problems 9 Hour
Markov Decision Processes-Policy Evaluation-Value Function Policies-Policy Iteration-Value Iteration-Asynchronous Value Iteration-Linear Program Formulation-Linear Systems with Quadratic Reward-Parametric
Representations-Nearest Neighbor-Kernel Smoothing-Linear Interpolation-Simplex Interpolation-Linear Regression-Neural Network regression-Forward Search-Branch and Bound-Sparse Sampling-Monte Carlo
Tree Search-Heuristic Search-Labeled Heuristic Search-Open-Loop Planning-Local Search-Genetic Algorithms-Cross Entropy Method-Evolution Strategies.
Unit-3 - Model Uncertainty 9 Hour
Bandit Problems-Bayesian Model Estimation-Undirected Exploration Strategies-Directed Exploration Strategies –Optimal Exploration Strategies-Maximum Likelihood Models-Bayesian Methods-Bayes-Adaptive
Markov decision Processes-Incremental Estimation of the Mean- Q-Learning- Sarsa-Eligibility Trace-Action Value Function Approximation-Behavioural Cloning-Data Set Aggregation-Stochastic Mixing Iterative
Learning-Maximum Margin Inverse Reinforcement Learning-Maximum Entropy Inverse Reinforcement Learning.
Unit-4 - State Uncertainty 9 Hour
Belief Initialization-Discrete State Filter-Kalman Filter-Extended Kalman Filter-Unscented Kalman Filter-Belief-State Markov Decision Processes-Conditional Plans-Alpha Vectors-Pruning-Value Iteration-Linear
Policies-Fully Observable Value Approximation-Fast Informed Bound-Fast Lower Bounds-Point-Based Value Iteration-Randomized Point-Based Value Iteration-Sawtooth Heuristic Search-Triangulated Value
Functions-Online Belief State Planning- Forward Search-Branch and Bound-Sparse Sampling-Monte Carlo Tree Search-Determinized Sparse Tree Search

528
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Multiagent Systems 9 Hour
Multiagent Reasoning-Simple Games-response Models-Dominant Strategy Equilibrium-Nash Equilibrium-Correlated Equilibrium-Hierarchical Softmax-Sequential Problems- Markov Games-Response Models- Nash
Equilibrium-Fictious Play-Gradient Ascent-Nash Q-Learning-State Uncertainty-Partially Observable Markov Games-Policy Evaluation-Nash Equilibrium-Dynamic Programming-Decentralized Partially Observable
Markov Decision Processes-Subclasses-Dynamic Programming-Iterative Best Response-Heuristic Search-Nonlinear Programming.

1. Mykel J. Kochenderfer, Tim A. Wheeler, Kyle H. Wray Algorithms for Decision Making, 4. Richard S. Sutton and Andrew G. Barto, Reinforcement Learning: An Introduction, 2nd Ed. MIT
MIT Press, 2022 Press, 2018. Dimitri P. Bertsekas, Dynamic Programming and Optimal Control, Athena
Learning
2. https://github.com/JuliaAcademy/Decision-Making-Under-Uncertainty Scientific, 2012 (4th Ed.).
Resources
3. Laura Graesser, Wah Loon Keng, Foundations of Deep Reinforcement Learning: Theory 5. D.V.Lindley, Making Decisions, 2nd Edition, John wiley & Sons.
and Practice in Python. Pearson Education, 2020.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 40% - 40% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.S Sai Manjunath Software engineer – I Cisco Systems 1. Dr. P Vetrivelan Professor, VIT-Chennai 1. Dr. Kanipriya M, SRMIST

529
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE499T NEURAL NETWORK MODELS OF COGNITION E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: describe the various neural processes 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes

Environment & Sustainability


CLR-2: illustrate computational neuroscience (Neural Network Models)

The engineer and society


Conduct investigations of
analyze simulating cognitive, perceptual, emotional, and motivational processes using neural network

Individual & Team Work


Engineering Knowledge
CLR-3:

Design/development of

Project Mgt. & Finance


models,

Modern Tool Usage

Life Long Learning


complex problems
CLR-4: formalize behavioral and biological levels of analysis

Problem Analysis

Communication
observe a range of phenomena within this framework, including attention, memory, language, higher-
CLR-5:
level cognition, motivation, emotion, and personality

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the knowledge on the various neural processes 1 2 - - - - - - - - - - - - 1
CO-2: implementation computational neuroscience (Neural Network Models) 1 2 - - - - - - - - - - - - 1
CO-3: simulating cognitive, perceptual, emotional, and motivational processes using neural network models, 1 3 - - - - - - - - - - - - 2
CO-4: analysis behavioral and biological levels 1 3 - - - - - - - - - - - - 3
examine a range of phenomena within this framework, including attention, memory, language, higher-
CO-5: 3 2 - - - - - - - - - - - - 3
level cognition, motivation, emotion, and personality

Unit-1 - Introduction to Neural Networks 9 Hour


The Necessity of Neural Networks- Toward A Natural-Science Account of Human Behavior -Interpreting Complex behavior Using Neural Networks - Network Architecture -A Statistical Framework -Evolving Artificial
Neural Networks -A Computational Approach -Ontogeny -Phylogeny - The Baldwin Effect - Simulations -Genetic Algorithms - Network Architectures -Evolution Simulations - Effects on Learning.
Unit-2 - Neurotransmission 9 Hour
Principles Of Neurotransmission-Neurotransmitter and Neuropeptide Systems-Synaptic Structure and Sites of Neurotransmitter Action- Neurotransmitters and Gene Regulation in The Nervous System-Cellular
Mechanisms-Mechanisms Of LTP-Phases Of LTP-Late Phase of LTP (L-LTP)-Protein Synthesis and LTI -Temporal Information Processing: -Spatial and Temporal Information -Time-Dependent Neuronal Properties-
A Model of Temporal Information Processing-Simulations of Temporal Processing-Plasticity
Unit-3 - Neocortical Processing 9 Hour
Perceiving-Development and Plasticity-Of Neocortical Processing Architectures-Two Strategies, Two Classes of Connections-Strategies for Response Selection -assembly-Forming Connections-Plasticity,
Orientation, and Size-Columnar Organization in TE-Organization of Afferents to TE-Optical Imaging of The Columnar Organization-Changeability of Selectivity in The Adult-Functions of the Columns-:- Case Studies:
Sparse Coding of Faces in A Neuronal Model, Face Recognition and Categorization
Unit-4 - Object Perception 9 Hour
Structure And Binding in Object Perception- Constancy and Structure in Object Perception-A Neural-Network Approach- -A Bottom-Up Model of Redundancy Compression in Entorhinal Cortex-Evaluating the
Entorhinal Model. -Incorporating Models of Sept Hippocampal Cholinergic Modulation-Behaving-Motor Cortex:, Network Modelling of Motor-Cortical Directional Operations-Selectionist Constraints on Neural
Networks.

530
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Reinforcement Learning 9 Hour
Reinforcement Learning of Complex Behavior-Adaptive Dopaminergic Neurons Report-Adaptive Properties of Dopaminergic Neurons-Relations to Associative Learning Theories-Neuronal-Network Simulation of the
Selection of Behavior-Simulation of the Selection of Stimulus Configurations-Implications for Complex Behavior-Reinforcement Learning in Artificial Intelligence- -Value Functions-The Optimality Equation Case
Studies: Models Using Dopamine-Through Reinforcement Learning-The Credit-Assignment Problem-The Reinforcement-Learning Problem

1. J.W. Donahoe, V.P. Dorsel, “Neural-Network Models of Cognition Biobehavioral 3. Hagan, Martin T., Howard B. Demuth, and Mark Beale. “Neural network design” PWS Publishing
Learning Foundations” (Volume 121) (Advances in Psychology, Volume 121) 1st Edition. Co., 1997.
Resources 2. Michael I. Jordan and Terrence J. Sejnowski. “Graphical Models: Foundations of
Neural Computation” 2011

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 40% - 40% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.P S Saravanan, Associate Consultant, CTS, USA 1. Dr.A Balaji , Senior Assistant Professor at VIT Bhopal University, 1. Dr. K Suresh, SRMIST
2. Prof.K Somasundram, Department of Computer Science and Engineering, Saveetha 2. Dr. B.Hariharan, SRMIST
School of Engineering, Saveetha Institute of Medical and Technical Sciences,

531
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE552T COMPUTATIONAL LINGUISTICS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: introduce the Basic Concepts of Computational Linguistics in NLP 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate the knowledge on language Interpretation

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: analyze the classification of computer in accomplishing linguistics tasks

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: illustrate the uniqueness of text meaning with linguistics multistage transformation

Environment &
Sustainability
CLR-5: illustrate the various modelling techniques based on linguistics

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: summarize the concepts in Computational Linguistics 3 2 - - - - - - - - - - 2 - -
CO-2: construct the various applications of computers in linguistics and language studies 3 2 - - - - - - - - - - - - 2
CO-3: design the various Tools for Linguistic analysis 3 - - - - - - - - - - - - - 2
CO-4: apply the text transformation of linguistic and strengthen NLP systems 3 - - - - - - - - - - - - - -
CO-5: apply the different model techniques based on linguistics 3 2 - - - - - - - - - - - - 3

Unit-1 - Introduction 9 Hour


The Role of Natural Language Processing – Linguistics and Its Structure - What We Mean by Computational Linguistics - The Important Role of The Fundamental Science - Current State of Applied Research on
Spanish.
Unit-2 - Overview of Grammar 9 Hour
A Historical Outline - The Structural list Approach - Initial Contribution of Chomsky - A Simple Context-Free Grammar - Transformational Grammars - The Linguistic Research After Chomsky: Valencies and
Interpretation – free grammar allows for a lot of different types of ungrammatical sentences. - Linguistic Research After Chomsky: Constraints - Head-Driven Phrase Structure Grammar - The Idea of Unification -
Multistage Transformer and Government Patterns - Dependency Trees - Semantic Links
Unit-3 - Products of Computational Linguistics 9 Hour
Present And Prospective - Classification of Applied Linguistic Systems - Automatic Hyphenation - Spell Checking - Grammar Checking - Style Checking - References To Words And Word Combinations - Information
Retrieval - Topical Summarization - Automatic Translation - Natural Language Interface - Extraction Of Factual Data From Texts - Text Generation - Systems Of Language Understanding - Related Systems.
Unit-4 - Language as A Meaning 9 Hour
Text Transformer - Possible Points Of View On Natural Language - Language As A Bi-Directional Transformer Text – Two Ways To Represent Meaning - Decomposition And Atomization Of Meaning - Not-
Uniqueness Of Meaning –-Text Mapping: Synonymy - Not-Uniqueness Of Text - Meaning Mapping: Homonymy - More On Homonymy - Multistage Character Of The Meaning - Text Transformer - Translation As A
Multistage Transformation - Two Sides Of A Sign - Linguistic Sign - Linguistic Sign In The MMT - Linguistic Sign In HPSG - Generative, MTT, And Constraint Ideas In Comparison - Case Study writing simple parsers
in groups for regional languages.

532
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Linguistic Models 9 Hour
What Is Modeling In General - Neurolinguistic Models - Psycholinguistic Models - Functional Models Of Language - Research Linguistic Models - Common Features Of Modern Models Of Language - Specific
Features Of The Meaning - Text Model - Reduced Models - Analogy In Natural Languages - Empirical Versus Rationalist Approaches - Limited Scope of The Modern Linguistic Theories – Case Study applications
involving language models, Demonstration of simple application specific modules using tools.

1. Igor Bolshakov & Alexander Gelbukh,"Computational Linguistics Models, Resources 3. Ralph Fasold & Jeff Connor-Linton, “An Introduction to Language and Linguistics”, Cambridge
Learning and applications ", Ciencia De La Computación. 2004. University Press. 2018
Resources 2. Alexander Clark, Chris Fox, & Shalom Lappin, “The Handbook of Computational 4. Roland Hausser, “Man-Machine Communication in natural language “.
Linguistics and Natural Language Processing”, A John Wiley & Sons. 2010 5. Stabler, “Notes on computational linguistics”, UCLA, Winter 2003

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.A.Mohanraj, Data Scientist, Standarad chartered 1. Dr.P.Visu, Professor, Velammal College of Engineering 1. Dr.P.G. Om Prakash, SRMIST
2. Mr.N. Nagendran, Senior Software Engineer, Cognizant 2. Dr.K.Sathishkumar, ,Associate Professor, KLEF- AP. 2. Dr.R.Siva, SRMIST

533
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21AIE536T ARTIFICIAL INTELLIGENCE ENGINES E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department Computational Intelligence Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the fundamentals of Artificial Neural Networks and Linear Associative Networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: gain Knowledge on Hopfield Network, Boltzmann Machines

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gain Knowledge on Hopfield Network, Boltzmann Machines

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: illustrate the Variational Auto encoders and Deep Back propagation Networks

Environment &
Sustainability
CLR-5: learn Reinforcement Learning function

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: describe the features of Artificial Neural network and Linear Associative Networks 3 2 1 - - - - - - - - - 1 1 1
CO-2: understand the Perceptrons and Back propagation algorithm 3 2 2 - - - - - - - - - - 1 -
CO-3: apply AI techniques in Hopfield Networks and Boltzmann Machines 3 1 1 - - - - - - - - - 1 2 1
CO-4: articulate AI systems that are used in Convolutional Neural Networks and Autoencoder networks 3 1 2 - - - - - - - - - - 1 -
CO-5: understand the Reinforcement Learning function and Applications 3 2 1 - - - - - - - - - 1 1 1

Unit-1 - Introduction 9 Hour


Artificial Neural Networks- Origins of Neural Networks, From Backprop to Deep Learning, Linear Associative Networks- Setting One Connection Weight, Learning One Association, Gradient Descent, Learning Two
Associations, Learning Many Associations, Learning Photographs
Unit-2 - Perceptrons and Backpropagation 9 Hour
Perceptron Learning Algorithm- Exclusive OR Problem, Exclusive OR Matters, Backpropagation Algorithm- Sigmoidal Hidden Units, Generalisation and Overfitting, Vanishing Gradients, Speeding Up Backprop,
Local and Global Mimima, Temporal Backprop, Early Backprop Achievements
Unit-3 - Hopfield Nets and Boltzmann Machines 9 Hour
Hopfield Network- Content Addressable Memory, Tolerance to Damage, Energy Function, Boltzmann Machines- Generative Models, Energy Function, Simulated Annealing, Learning by Sculpting Distributions,
learning in Boltzmann Machines, Learning by Maximising Likelihood, Restricted Boltzmann Machines, Autoencoder and Deep Autoencoder Networks, Deep RBMs - Restricted Boltzmann Machines, Training
Restricted Boltzmann Machines, Deep Autoencoder Networks
Unit-4 - Variational Autoencoder and Deep Backprop Networks 9 Hour
Variational Autoencoders- Overview of Variational Autoencoders, Latent Variables and Manifolds, Key Quantities, VA Work, Evidence Lower Bound, Alternative Derivation, Maximising the Lower Bound, Conditional
Variational Autoencoders Applications, Convolutional Neural Networks- LeNet1, LeNet5, AlexNet, GoogLeNet and ResNet, Ladder Autoencoder Networks- Denoising Autoencoders- Fooling Neural Networks-
Generative Adversarial Networks- Temporal Deep Neural Networks- Capsule Networks, Case Studies: Backpropagation neural network for Landslide monitoring,
Unit-5 - Reinforcement Learning 9 Hour
Reinforcement Learning- Markov Decision Processes- Formalising the Problem- Bellman Equation- Learning State-Value Functions- Eligibility Traces- Learning Action-Value Functions- Balancing a Pole-
Applications, Case Studies: Adaptive Traffic Signal Control, Pommerman.

534
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Artificial Intelligence Engines: A Tutorial Introduction to the Mathematics of Deep Learning, 5. Machine learning with neural networks: Bernhard Mehlig, Cambridge University Press 2021.
James V Stone, Sebtel Press 2019. 6. https://www.elsevier.com/books/artificial-intelligence-and-data-driven-optimization-of-
Learning 2. Deep learning: Ian Goodfellow and Yoshua Bengio and Aaron Courville, MIT press 2016. internal-combustion-engines/badra/978-0-323-88457-0
Resources 3. Dive into Deep Learning: Aston Zhang, Zachary C. Lipton, Mu Li, And Alexander J. 2018. 7. https://www.deeplearningbook.org/lecture_slides.html
4. MATLAB Deep Learning-with Machine Learning, Neural Networks and Artificial Intelligence: 8. https://d2l.ai/d2l-en-mxnet.pdf
Phil Kim, Springer, Apress 2017.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Kodainathan, Data Scientist Elpis IT solutions pvt Ltd 1. Dr. A. Menaka Pushpa, Assistant Professor (SG) SCOPE, VIT, 1. Dr.AR. Arunarani,, SRMIST,
Chennai Campus

535
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21AIE538T ARTIFICIAL INTELLIGENCE FOR INDUSTRIAL APPLICATIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department Computational Intelligence Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: analyze the various characteristics of Intelligent agents 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the growth of AI Technology in Industry

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: learn the technical elements and algorithm for solving problems using Artificial Intelligence

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: apply knowledge to establish Industrial AI Technology and its assessment

Environment &
Sustainability
CLR-5: apply the concepts of AI to attain industrial automation and its application

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: use appropriate search algorithms for any AI problem - - - 3 3 - - - - 1 - 2 1 2 -
CO-2: identify appropriate AI methods and new opportunity spaces AI for industrial application - - - 2 2 - - - - 1 - 1 1 2 -
CO-3: understand the categories of Algorithm in Industrial AI - - - 2 2 - - - - 1 - 1 1 3 2
CO-4: understanding the assessment and capability to establish industrial AI - - - 2 2 - - - - 1 - 2 1 2 2
CO-5: understand the levels of automation and its application - - - 2 2 - - - - - - 2 1 2 -

Unit-1 - Introduction to Al and Production Systems 9 Hour


Introduction to Al - Problem formulation, Problem Definition - Production systems, Control strategies, Search strategies. Problem characteristics, Production system characteristics - Specialized production systems
- Problem solving methods -Problem graphs, Matching, Indexing and Heuristic functions -Hill Climbing, Depth first and Breath first, Constraints satisfaction, Knowledge Representation and Reasoning.
Unit-2 - The Development and Application of AI Technology 9 Hour
Why do we need Industrial AI – New Perspective in industrial systems for AI, Basic problem in Industry, Basic method of problem solving with AI, what kind of AI Technology is most suitable for industry, Machine
Intelligence meets industry, Difference between industry AI and AI, Challenge of AI in Industry, New opportunity spaces for industry AI to realize industrial value transformation. Definition and Meaning of Industrial
AI – The Beginning of Industrial AI, Purpose and value of Industrial AI, GE predix success and failure.
Unit-3 - Technical Elements and Algorithm of Industrial AI 9 Hour
Technical Element – Data, Analytics, Platform, Operation and Human Machine Technology, CPS, Industrial AI: Categories of Algorithm, Industrial AI Algorithm: Selection and Application. Application Scenario Types
of Industrial AI, Enabling Industrial AI system – Intelligence monitoring and maintenance platform for CNC machine, Intelligence operation, intelligence rail transit predictive maintenance system.
Unit-4 - How to Establish Industry AI Technology and Capability 9 Hour
Assessment of Basic capability Maturity during industrial intelligence transformation – Assessment Tools for global industrial AI enterprise transformation achievement – Foxconn Lighthouse factory – How to
construct organizational intelligence transformation ability in industrial enterprises – Open-source industrial big data competitions.
Unit-5 - Industrial AI applications and Case studies 9 Hour
Applications of Industrial AI in Monitoring, optimization and control.AI applications in Industry Automation using -Natural Language Processing-Speech Recognition-Computer vision. Machine Learning Models for
Industrial Applications, AI & Digital Platforms case study. A Framework for Learning System for Complex Industrial Processes.

536
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Elaine Rich, “Artificial Intelligence”, 2nd Edition, McGraw Hill, 2005 4. Anuradha Srinivasaraghavan, Vincy Joseph “Machine Learning”, Wiley, 2019
Learning 2. AI and Learning Systems - Industrial Applications and Future Directions, Konstantinos 5. Wolfgang Ertel,” Introduction to Artificial Intelligence”, Second Edition, Springer, 2017.
Resources Kyprianidis and Erik Dahlquist, published in London, United Kingdom, 2021. 6. Rajiv Chopra, “Deep Learning”, 1st edition, Khanna Publishing House, 2018.
3. Industrial AI – Application with sustainable performance, Jay Lee, Springer Publication, 2020.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 20% -
Level 2 Understand 15% - 10% - 20% -
Level 3 Apply 30% - 35% - 20% -
Level 4 Analyze 30% - 25% - 20% -
Level 5 Evaluate 10% - 20% - 20% -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Naveen Baskaran, ADP Solution Chennai 1. Dr.P.SivaKumar, VIT Chennai 1. Dr.S.Nagendra Prabhu, SRMIST
2. Dr.Senthil, NHCE Bangalore

537
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21AIE539T ARTIFICIAL INTELLIGENCE IN MEDICAL IMAGING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department Computational Intelligence Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: discuss the fundamentals of Medical Imaging 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: introduce the concepts of Diagnostic Radiology

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: impart knowledge on Nuclear Medicine

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: become familiar in applying AI techniques in medical imaging

Environment &
Sustainability
CLR-5: explore various future perspectives of medical imaging Technology

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the fundamentals of Medical Imaging 3 2 1 - - - - - - - - - 1 2 2
CO-2: summarizes the concepts of Diagnostic Radiology 3 2 2 - - - - - - - - - - - -
CO-3: utilize the features and characteristics of Nuclear Medicine 3 1 1 - - - - - - - - - - - 2
CO-4: articulate AI systems that are used in medical imaging 3 1 2 - - - - - - - - - - - -
CO-5: apply various AI techniques in medical imaging 3 3 3 - - - - - - - - - - - 2

Unit-1 - Introduction 9 Hour


Introduction to medical imaging – The modalities – Digital imaging basics – Image properties – Radiation and the atom – Interaction of radiation with matter – Image Quality – Spatial resolution – contrast resolution
– Medical imaging informatics – Ontologies, standards and profiles – Algorithms for image and non-image analytics – Security and privacy.
Unit-2 - Diagnostic Radiology 9 Hour
X-Ray Production tubes and generators – Production of X-Rays – X-Ray tubes – X-Ray generators – Factors affecting X-Ray emission – Radiography – Geometry of projection radiography – scattered radiation in
projection radiographic imaging – Computed Radiography – Artifacts in digital radiography – Dual energy subtraction radiography- Fluoroscopy – Computed Tomography – X-Ray Dosimetry – Magnetic Resonance
Basics – Ultrasound.
Unit-3 - Nuclear Medicine 9 Hour
Radioactivity and nuclear Transformation – Radiation detection and measurement – Nuclear Imaging – The Gamma camera – Planar Nuclear Imaging – Computers in Nuclear Imaging – Nuclear Tomographic
Imaging – Single Photon and Positron Emission Tomography (SPECT and PET) – Dual modality Imaging – Advances in PET Imaging.
Unit-4 - Applying AI in Medical Imaging 9 Hour
Historical perspective – Quantitative image analysis – Computer aided detection and diagnosis – Triage – image registration – Radiomics: Radiology meets Big Data – Applications beyond image interpretation –
Applications beyond radiology – Case Studies: CAD in CT Colonography – CAD in Mammography – Diabetic Retinopathy
Unit-5 - Future Perspectives 9 Hour
Progress in established imaging modalities: X-Ray and CT – Magnetic Resonance Imaging – Ultra sound Imaging – PET and Multimodality Imaging – Molecular Imaging – Optical Tomography – Advanced Image
processing.

538
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Jerrold T. Bushberg, , J. Anthony Seibert PhD (Author), Edwin M. Leidholdt The Essential 4. Artificial Intelligence in Medical Imaging, Opportunities, Applications and Risks, Erik R.
Learning Physics of Medical Imaging, 2021 (1,2,3) Ranschaert, Sergey Morozov, Paul R. Algra, Springer, 2019.
Resources 2. Mark A.Haidekker, Medical Imaging Technology, Springer Briefs in Physics, 2013.(5) 5. Artificial Intelligence in Medical Imaging from theory to clinical practise, Lia Morra, Silvia
3. Haidekker, M. A., “Medical Imaging Technology”, Springer, 2013. Delsanto, Loredana Correale, CRC Press 2019 (4)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 10% - 20% -
Level 2 Understand 20% - 10% - 20% -
Level 3 Apply 30% - 40% - 30% -
Level 4 Analyze 30% - 40% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.R. Durairaj, Clayfin Technologies Private Limited, Chennai 1. Dr.M.S. Bhuvaneswari, Asso. Professor, 1. Dr.R. Beaulah Jeyavathana, SRMIST
Mepco Schlenk Engineering College, Sivakasi

539
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21AIE541T MULTIMODAL MACHINE LEARNING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department Computational Intelligence Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: provide the basic understanding of multimodal data and its importance in various fields 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: various representations used in multimodal machine learning using different models

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the details about the translation and mapping algorithms of multimodal data

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: create interest to develop a project using various applications of multimodal machine learning framework

Environment &
Sustainability
CLR-5: importance of multimodal deep learning and behavior generations functions

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: outline the critical elements of multimodal data and models 3 3 3 - - - - - - - - - 1 - -
CO-2: illustrate different kinds of unimodal and multimodal representations 3 2 2 - - - - - - - - - - 2 -
CO-3: demonstrate multimodal translation and mapping 3 2 2 - - - - - - - - - 1 - -
CO-4: classify machine learning techniques and frameworks of multimodal applications in real time scenario 3 2 2 - - - - - - - - - - - -
CO-5: analyze various multimodal fusion and behavior generation for multimodal applications 3 2 2 - - - - - - - - - 1 - 2

Unit-1 - Introduction 9 Hour


Introduction – Multimodal, Basic Concepts - Linear models - Score and loss functions – regularization, Neural networks - Activation functions - multi-layer perceptron, Optimization - Stochastic gradient descent –
backpropagation
Unit-2 - Unimodal and Multimodal Representations 9 Hour
Language representations - Distributional hypothesis and word embedding, Visual representations - Convolutional neural networks, Acoustic representations - Spectrograms – Autoencoders, Multimodal
representations - Joint representations - Visual semantic spaces - multimodal autoencoder, Orthogonal joint representations - Component analysis, Parallel multimodal representations - Similarity metrics, canonical
correlation analysis
Unit-3 - Multimodal Translation and Mapping 9 Hour
Language models – Unigrams – bigrams - skip-grams - skip-thought, Unimodal sequence modelling - Recurrent neural networks, LSTMs, Optimization - Backpropagation through time, Multimodal translation and
mapping - Encoder-decoder models - Machine translation - Image captioning, Generative vs retrieval approaches - Viseme generation - visual puppetry, Modality alignment - Latent alignment approaches - Attention
models - multi-instance learning, Explicit alignment - Dynamic time warping
Unit-4 - Multimodal Applications 9 Hour
Multimodal fusion and co-learning - Model free approaches - Early and late fusion - hybrid models, Kernel-based fusion - Multiple kernel learning, Multimodal graphical models - Factorial HMM, Multi-view Hidden
CRF, Case studies - Automatic Face Recognition - Video Segmentation and Keyframe Extraction - Gesture Recognition - Biometric-based System
Unit-5 - Deep Learning for Multimodal 9 Hour
Deep Learning for multimodal data fusion – Basics of multimodal deep learning – Multimodal image-to-image translation networks – Multimodal encoder decoder networks, Multimodal applications - Image captioning
- Video description - AVSR, Core technical challenges - Representation learning – translation – alignment - fusion and co-learning

540
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Multimodal Scene Understanding: Algorithms, Applications and Deep Learning, 4. Unifying Visual-Semantic Embeddings with Multimodal Neural Language Models. Ryan Kiros, Ruslan
Michael Ying Yang, Bodo Rosenhahn, Vittorio Murino, Academic Press, Elsevier, Salakhutdinov, and Richard S. Zemel; TACL 2015
2019, ISBN:978-0-12-817358-9 (Unit V) 5. Multi-View Latent Variable Discriminative Models for Action Recognition. Yale Song, Louis-Philippe
Learning 2. Representation Learning: A Review and New Perspectives. Yoshua Bengio, Aaron Morency, Randall Davis, CVPR 2012
Resources Courville, and Pascal Vincent 6. M. Gori, “Machine Learning: A Constraint-Based Approach”, 2017, Morgan Kauffman, ISBN: 978-
3. Visualizing and understanding recurrent networks. Andrej Karpathy, Justin 0081006597
Johnson, Li Fei-Fei, 2015 7. F. Camastra, A. Vinciarelli, “Machine Learning for Audio, Image and Video Analysis: Theory and
Applications”, 2nd Edition, 2016, Springer Verlag, ISBN: 978-1447168409

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sanjay Hotwani, Senior Manager – Data Science, 1. Dr. Tulasi Prasad Sariki, Associate Professor, VIT, Chennai, 1. Dr.T.Subha, SRMIST
Products &Technology, PwC US [email protected]

541
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

UNDERGRADUATE/ INTEGRATED POST


GRADUATE DEGREE PROGRAMMES
(With exit option of Diploma)

(Choice Based Flexible Credit System)

Regulations 2021

Volume – 11M
(Syllabi for M.Tech (Integrated) Computer Science and
Engineering w/s in Cyber Security & Digital Forensics
Programme Courses)

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

542
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Core Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

543
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC503T SECURITY SERVICE MANAGEMENT C PROFESSIONAL CORE
Code Name Category 3 1 0 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
understand risk management security principles and concepts, and threat modelling concepts and Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
methodologies
explain concepts of security models, vulnerabilities of security architectures and methods of

Environment & Sustainability


CLR-2:
cryptanalytic attacks

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


study secure design principles in network architectures and Manage identification and authentication of
CLR-3:

Modern Tool Usage


people, devices, and services

Life Long Learning


complex problems
Problem Analysis

Communication
CLR-4: demonstrate the knowledge and skills for Security Assessment and Testing and security audits
CLR-5: manage Security Operations concepts and logging and monitoring activities with various recovery plans

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
students can able to identify security principles and concepts, and threat modelling concepts and
CO-1: - - - - 2 - - - - - - - - - -
methodologies
students can obtain knowledge from vulnerabilities of security architectures and methods of cryptanalytic
CO-2: - - 2 - - - - - - - - - - - 3
attacks
CO-3: students can gain information from secure design principles in network architectures - - - - 2 - - - - - - - - - 3
CO-4: students are able to gain knowledge for Security Assessment and Testing and security audits - - 2 - - - - - - - - - - - 3
students can enhance their knowledge of obtaining logging and monitoring activities with various recovery
CO-5: - - - - 2 - - - - - - - - - -
plans

Unit-1 - Security and Risk Management 12 Hour


security concepts, security governance principles, requirements for investigation types, security policy, standards, procedures, and guidelines, Business Continuity (BC) requirements, risk management concepts,
threat modelling concepts and methodologies.
Unit-2 - Security Architecture and Engineering 12 Hour
fundamental concepts of security models (e.g., Biba, Star Model, Bell-LaPadula), security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption),
vulnerabilities of security architectures, designs, and solution elements, cryptographic solutions, methods of cryptanalytic attacks, security principles to site and facility design.
Unit-3 - Communication and Network Security 12 Hour
secure design principles in network architectures, Secure network components, secure communication channels according to design, Identity and Access Management (IAM)- Physical and logical access to
assets, identification and authentication of people, devices, and services, identity with a third-party service, authorization mechanisms.
Unit-4 - Security Assessment and Testing 12 Hour
Design and validate assessment, test, and audit strategies, conduct security control testing, collect security process data (e.g., technical, and administrative), Analyze test output and generate report, Conduct, or
facilitate security audits.

544
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Security Operations 12 Hour
Understand and comply with investigations, conduct logging and monitoring activities, Perform Configuration Management (CM) (e.g., provisioning, baselining, automation), Apply foundational security operations
concepts, apply resource protection, conduct incident management, Implement Disaster Recovery (DR) processes, Test Disaster Recovery Plans (DRP).

1. https://www.koenig-solutions.com/security-management-training-certification-courses. 4. https://www.linkedin.com/learning/certified-information-security-manager-cism-cert-prep-2022-3-
Learning
2. https://www.koenig-solutions.com/cissp-certification-training-course#benefitsc information-security-program?trk=learning-topics_learning-search-card_search-
Resources
3. https://www.linkedin.com/learning/topics/security-management-and-policy card&upsellOrderOrigin=default_guest_learning.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.T Ravichandran, Product Manager, Servis2 IT Team, Chennai. 1. Dr. P. Balamurugan, SRMIST
2. Mr. Dhanvanth Kesavan, NTT Data Cyber security analyst, Chennai.

545
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC504J ANDROID MALWARE ANALYSIS C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the various Android malware threats 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: gain knowledge about Sandboxing and Memory Analysis

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gain knowledge about traffic analysis of Android application

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: analyze different malware families and perform static and dynamic mechanisms

Environment &
Sustainability
CLR-5: explore popular security vulnerabilities in Android Application

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain knowledge about the different forms of malware - - - - - - 2 - - 3 - - - - -
CO-2: set up a safe virtual environment to analyze malware - - - - - - 2 - - - - - - - -
CO-3: navigate, comment, and modify android malware samples - - - - - - - - - 3 - - - - 3
CO-4: use tools and perform static and dynamic analysis - - - - - - 2 - - - - - - - 3
CO-5: use web view and explore Android vulnerabilities - - - - - - - - - 3 - - - - -

Unit-1 - Introduction 15 Hour


Basics- Android development tools- Risky Apps- Malware Threats- Open-Source Tools- Vulnerability research for Android OS- Antivirus Scans. Lab: Static Analysis of Android Application
Unit-2 – Advanced Static Analysis 15 Hour
Sandbox Analysis- Emulation Analysis- Native Analysis- Reverse Engineering- Memory Analysis- Traffic Analysis of Android Devices-Passive and Active Analysis- HTTPs proxy interception- extracting sensitive
files Malware Collections- Lab: Reversing of Android malware applications.
Unit-3 – Behavioral Analysis 15 Hour
Process Emulation- Configuring device with Genymotion- Using the ADB Tool- Capabilities and Limitations of the Emulators- Network Architecture for Sniffing in a Physical Environment- Device View- Logcat View-
Application Tracing- Analysis of Results- Imaging the Device. Lab: Case study on Usbcleaver.
Unit-4 - Android Vulnerabilities 15 Hour
SQLite in depth- Web view vulnerability - Infecting legitimate APKs- Vulnerabilities in ad libraries- Cross-Application Scripting in Android- Lab- Exploring security vulnerabilities using Drozer and Andriller.
Unit-5 - Exploitation 15 Hour
ARM architecture- Execution modes- Simple stack-based buffer overflow- Return-oriented programming- Android root exploits- Lab: Writing the pentest report for Android malwares.

1. Ken Dunham, Android Malware and Analysis, Kindle Edition, Auerbach 3. Pratiyush Guleria, Android for Beginners: Step by Step guide to develop Android App: Learn Step-
Learning Publications.International Standard Book Number-13:978-1-4822-5220-0. by-Step 1st Edition, Kindle Edition, and ISBN- 13 978-9388176231.
Resources 2. Aditya Gupta, Learning Pentesting for Android Devices Illustrated Edition, Kindle
Edition, ISBN-13- 978-1783288984.

546
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Karthik Expert Member from k7 Computing 1. Dr Bhawana Rudra Assistant Professor (Grade II) National Institute of 1. Mr. V. Joseph Raymond, SRMIST
Technology, Warangal

547
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Elective Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

548
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE531T CYBER SECURITY OPERATIONS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic security operations 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquire knowledge in assessing security operation capabilities

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the SOC Infrastructure and security Events Generation

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the security technology and preparation to operate

Environment &
Sustainability
CLR-5: understand the types of events and Incidents

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the knowledge of security technologies - 2 - - - - 2 - - - - - - - -
CO-2: analyze the security operation capabilities - - - - - - - - - 3 - 3 - - -
CO-3: evaluate the security Events Generation - 2 - - - - - - - - - 3 - - 3
CO-4: analyze the preparing to operate - - - - - - 2 - - 3 - - - - 3
CO-5: evaluate the Events and Incidents - 2 - - - - - - - - - 3 - - -

Unit-1 - Introduction to Security Operations and the SOC Technologies 9 Hour


Cyber security Challenges- Introduction to Information Assurance- Introduction to Risk Management- Information Security Incident Response- SOC Generations- Characteristics of an Effective SOC–Introduction to
Maturity Models - Applying Maturity Models to SOC- Phases of Building a SOC- Challenges and Obstacles-Data Collection and Analysis-Vulnerability Management-Threat Intelligence-Compliance- Ticketing and
Case Management- Collaboration- SOC Conceptual Architecture
Unit-2 - Assessing Security Operations Capabilities 9 Hour
Assessment Methodology-Organization’s Threat Landscape-SOC Sponsorship- Allocated Budget- Presenting Data Strategy Elements-SOC Model of Operation-SOC Services-SOC Capabilities Roadmap
Unit-3 - SOC Infrastructure and Security Events Generation, Collection Vulnerability Management 9 Hour
Design Considerations- Model of operation-Facilities-Active Infrastructure-Data Collection- Cloud Security- Intrusion Detection and Prevention System- Network Telemetry with Network Flow - Handling
Vulnerabilities-Automating Vulnerability Management- Threat Intelligence
Unit-4 - Technology and Preparing to Operate 9 Hour
Network- Security- Systems- Storage- Collaboration- Technologies to consider during SOC design- Breach Detection- Final SOC Architecture- Preparing to Operate-Key Challenges- Managing Challenges through
a Well Managed Transition
Unit-5 - Reacting to Events and Incidents 9 Hour
Event Intake, Enrichment, Monitoring and Handling- Closing and Reporting on the case- Review and Assessing the SOC- Maintaining and Improving SOC

1. Joseph Muniz, Gary McIntyre, Security Operations Center, Cisco press 2015 3. Russel C Hibler, Engineering Mechanics: Statics, Dynamics, Pearson,14th ed., 2015
Learning
2. John Rittinghouse PhD CISM Captain, William M. Hancock PhD CISSP CISM, Digital 4. Robert H. Deatherage, Jr., Security Operations an Introduction to planning and Conductive Private
Resources
Press, 2003 Security Details for High-Risk Areas
549
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sankaranarayanan, Security Analyst, Philips 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr. J. Godwin Ponsam, SRMIST

550
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE532T NETWORK MANAGEMENT AND PROTOCOLS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: determine the various type of Networks and the Network Management basics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: exploring the Network Management Standards

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: analyze the working of Simple Network Management Protocol and its various versions

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: exploring the working of Remote Monitoring

Environment &
Sustainability
CLR-5: analyze the Network Management Applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: produce knowledge on networks and network management - 3 - - - - - - - - - - - - -
CO-2: gain knowledge on various standards - - - - 3 - - - - - - - - - 3
CO-3: analyze the working of SNMP protocol and its various applications - - - - - - - - - - 3 - - - 3
CO-4: apply the network management tools and gather information from the network - 3 - - 3 - - - - - - - - - -
CO-5: apply the knowledge to create an efficient network - - - - 3 - - - - - 3 - - - -

Unit-1 - Network Management Overview 9 Hour


Telephone Network Management, Distributed Computing Environment ,TCP/IP Based Networks, Communication Protocols and Standards, Protocol Layer and Services, Challenges of IT Managers, Network
Management, Network and System Management, Network Management System Platform, Current status and future of Network, Management Network Management Standards, Network Management Model -
Organizational model, Information Model, Management Information Trees, Communication Model, ASN.1, Terminology, Symbols and Conventions, Functional Model
Unit-2 - SNMP and Network Management 9 Hour
Introduction to SNMP, SNMP v1 model, Organization Model, System overview, SNMP v1 Information model, Structure of Management Information, Managed Objects MIB-Object Group, System Group, Interfaces
Group, Address Translation group, IP Group, ICMP Group, TCP Group, UDP Group, SNMP v1Communication model, Functional model, SNMPv2, System Architecture, MIB, Protocol, SNMPv3, MIB, User Based
Security Model, Access Control
Unit-3 - Remote Monitoring System 9 Hour
Remote Monitoring, RMON SMI and MIB, RMON1, RMON2, System Utilities for Management, Tools, Network Statistics Measurement Systems, Traffic Load, Protocol Statistics, Data and Error Statistics, Network
Management System, Components, Requirements, System Management, Network Management Applications, Configuration Management, Inventory Management, Performance Management, Tools
Unit-4 - Fault Management 9 Hour
Fault Management -Architecture, Fault location, Fault isolation, Algorithm, Self-healing, avoiding failures, Configuration setting, Configuration discovery and Change Control, Configuration Management Applications,
Patch Management, Approaches for Performance Management, Performance Monitoring and Reporting, Performance trouble shooting, Capacity Planning, Account Management, Report Management-System and
User Reports, Policy Management, Service Level Management
Unit-5 - Network Design and Planning 9 Hour
Network Design and Planning, Network Design for Enterprise Network, Network Design Process, Data Collection, Data Generation, Traffic Generators, Cost Generators, Topology, Architecture, Graph, Link,
Algorithms, Network Design Techniques, Performance Analysis, Queuing Essentials, Loss and Delay, Reliability, Network Cost
551
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Mani Subramanian ―Network Management Principles and Practiceǁ, Second Edition, 3. Greg Tomsho, Ed Tittel, David Johnson, ―Guide to Network Essentials, Fifth Edition, Cengage
Learning Pearson Publication, 2012. Learning, 2010
Resources 2. Dinesh Chandra Verma―Principles of Computer Systems and Network Management, 4. Teresa C. Piliouras, Network Design Management and Technical Perspectives, Second
Springer,2009 Edition,2004

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Srinivasan Varadarajan, Manhattan Associates, Atlanta 1. Dr. I.Joe Louis Paul, Associate Professor, SSN College of 1. Dr S. Metilda Florence, SRMIST
Engineering, TamilNadu
2. Mr. Shiva Praveen, American Express, USA 2. Dr. B. Vinayaga Sundaram, Associate Professor, Madras Institute of
Technology, Chennai

552
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE533T FIREWALLS AND ACCESS CONTROLS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
understanding why port-based firewalls have become obsolete & addressing the data leakage problem, Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
device sprawl
CLR-2: recognizing the security and business benefits of next-generation firewalls

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: configure and troubleshoot remote connectivity through direct access and the cloud

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn to interpret the SELinux log events that describe to us what activities SELinux has prevented

Environment &
Sustainability
CLR-5: examining the Challenges in a Global Access Controls Strategy

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understanding accessibility tactics and examining the shortcomings of intrusion prevention - - - - - - 2 - - - - - - - -
comparing performance between next-generation and legacy firewall architectures and knowing what
CO-2: - - - - - - - - - 3 - - - - 3
features to look for in a next-generation firewall
configuring Advanced Global Protect Features, Centralizing logs, and setting up site-to-site VPNs and
CO-3: - - - - - - 2 - - - - - - - 3
Large-Scale VPNs.
understanding SELinux Decisions and Logging and Defining users that have sufficient rights to do their
CO-4: - - - - - - 2 - - 3 - - - - -
jobs, ranging from unprivileged users to fully privileged users, running almost without SELinux protection
CO-5: understanding the Security Matrix and Developing a Directory-Based Access Control Strategy - - - - - - 2 - - - - - - - -

Unit-1 - Introduction to Firewalls 9 Hour


Why Legacy Firewalls Are No Longer Effective - Data Leakage Is a Problem - Compliance Is Not Optional - Applications Are Not All Good or All Bad - Applications Are Evasive - Threats Are Coming Along for the
Ride - Whatever Happened to the Firewall? - Traditional IPS Is a Poor Match for Today’s Threats - UTM Only Makes What Is Broken Cheaper - It’s Time to Fix the Firewall
Unit-2 - Solving the Problem with Next-Generation Firewalls 9 Hour
The Next-Generation Firewall - What a Next-Generation Firewall Isn’t - Benefits of Next-Generation - Safe Enablement through Smart Policies Firewalls - Defining Your Requirements and Developing an RFP -
Deployment Flexibility Matters - Addressing Mobile and Remote Users - Ten Evaluation Criteria for Next-Generation Firewalls-Identify Applications, Not Ports - Identify Users, Not IP Addresses - Identify Content,
Not Packets – Control
Unit-3 - Securing Remote Access in Palo Alto Networks 9 Hour
Understanding log forwarding profiles and best practices - Learning about Panorama and log collectors - Forwarding logs to syslog, SMTP, and other options - Exploring log forwarding profiles - Troubleshooting
logs and log forwarding - Learning about advanced configuration features - Leveraging quarantine to isolate agents - Configuring a site-to-site VPN connection - Anti Phishing with User Credential Detection -
Practical troubleshooting and Best Practice Tools.
Unit-4 - SELinux Access Controls 9 Hour
SELinux users and roles - Jumping from one role to another - Context switching during authentication - Application-based contexts - Reading and changing file contexts - The context of a process - Dealing with
types, permissions, and constraints - Integrating with Linux netfilter - Introducing labeled networking - Example – labeled IPSec

553
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Security Controls 9 Hour
Simplifying the Security Matrix - Understanding Identification - Understanding Authentication - Understanding Authorization - Understanding Access Control - Examining Directory Services - Understanding LDAPv3
- Understanding the Meta-Directory - Revisiting Security Policy Domains- Examining the Challenges in a Global Access - Exploring a Future with Global Access Controls-Understanding Standard Data-Related
Access Rights.

1. Lawrence C. Miller - Next-Generation Firewalls for Dummies Wiley Publishing, ISBN 3. Sven Vermeulen - SELinux System Administration_ A Comprehensive Guide to Walk You Through
978-0-470-93955-0 SELinux Access Controls-Packt Publishing (2013)
Learning
2. Tom Piens - Securing Remote Access in Palo Alto Networks_ Practical techniques to 4. Dennis C Brewer - Security controls for Sarbanes-Oxley section 404 IT compliance _ authorization,
Resources
enable and protect remote users, improve your security posture, and troubleshoot next- authentication, and access-Wiley Pub (2006)
generation firewalls-Packt Publication

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. S. Sajiv, Technical Leader, CISCO 1. Dr. A. Balaji, School of Computing Science and Engineering 1. Dr. S. Prabakeran, SRMIST
(SCSE), VIT Bhopal University
2. Mr. Varun Subramanian, QA Automation Tester, Likewize

554
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE534T NETWORK PROGRAMMING AND MANAGEMENT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: explore different socket function and implement client server applications using sockets 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: analyze various application program like TELNET, DNS, DHCP

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: create Thread and Raw Socket

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: create Macros for including Objects In MIB Structure

Environment &
Sustainability
CLR-5: explore SNMPv1, v2 and v3 protocols and practical issues

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: define elementary socket functions - 3 - - - - - - - - - - - - -
CO-2: implement client –server applications using Sockets - - - - - - - - - - - 2 - - 3
CO-3: create Thread and Raw Socket - 3 - - - - - - - - - - - - 3
CO-4: implement Macros for including Objects In MIB Structure - 3 - - - - - - - - - - - - 3
CO-5: determine SNMPv1, v2 and v3 protocols and practical issues - - - - - - - - - - - 2 - - 3

Unit-1 – Sockets and Application Development 9 Hour


Introduction to Socket Programming – System Calls – Address conversion functions – POSIX Signal Handling – Server with multiple clients – Boundary conditions – Server process Crashes, Server host Crashes,
Server Crashes and reboots, Server Shutdown – I/O Multiplexing – I/O Models -TCP echo client/server with I/O Multiplexing
Unit-2 – Socket Options 9 Hour
Socket options – getsockopt and setsockopt functions – Generic socket options – IP socket options – ICMP socket options – TCP socket options – Multiplexing TCP and UDP sockets – SCTP Sockets – SCTP
Client/server – Streaming Example – Domain name system – gethostbyname, gethostbyaddr, getservbyname and getservbyport functions – Protocol Independent functions in TCP Client/Server Scenario
Unit-3 – Advanced Sockets 9 Hour
Ipv4 and Ipv6 interoperability – Threaded servers – Thread creation and termination – TCP echo server using threads – Mutex – Condition variables – Raw sockets – Raw socket creation – Raw socket output –
Raw socket input – ping program – traceroute program
Unit-4 – Simple Network Management 9 Hour
SNMP network management concepts – SNMPv1 – Management information – MIB Structure – Object syntax – Standard MIB‟s – MIB-II Groups – SNMPv1 protocol and Practical issues.
Unit-5 – SNMP V2, V3 and RMON 9 Hour
Introduction to SNMPv2 – SMI for SNMPV2 – Protocol – SNMPv3 – Architecture and applications – Security and access control model – Overview of RMON

1. W. Richard Stevens, “UNIX Network Programming Vol-I”, Third Edition, PHI Pearson 3. D... E. Comer, “Internetworking with TCP/IP Vol- III: Client-Server Programming and
Learning Education, 2003. Application BSD Sockets Version”, Second Edition, Pearson Edition, 2003.
Resources 2. William Stallings, “SNMP, SNMPv2, SNMPv3 and RMON 1 and 2”, Third Edition, Pearson 4. Behrouz A.Forouzan , ― TCP/IP protocol suiteǁ, 4th edition, Mc Graw Hill education private
Edition, 2009. limited,2010
555
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Srinivasan Varadarajan, Manhattan Associates, Atlanta 1. Dr. I.Joe Louis Paul, Associate Professor, SSN College of 1. Dr S. Metilda Florence, SRMIST
Engineering, TamilNadu
2. Mr. Shiva Praveen, American Express, USA 2. Dr. B. Vinayaga Sundaram, Associate Professor, Madras Institute of
Technology, Chennai

556
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE535T NETWORK INTRUSIONS AND COMPUTER FORENSICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic of forensic investigation and its procedure 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the packet capturing and Analysis

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: acquire knowledge in location awareness and Logs

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the network Intrusions and Alerting

Environment &
Sustainability
CLR-5: understand the types of scanning

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the knowledge forensic investigation 2 - - - - - - - - - - - - - -
CO-2: implement packet capturing and analysis - 2 - - - - - - - - - - - - 3
CO-3: evaluate the different types of logs 2 2 - - - - - - - - - - - - 3
CO-4: analyze the intrusion detection system - 2 - - - - - - - - - - - - -
CO-5: test using scanning technique 2 - - - - - - - - - - - - - -

Unit-1 - Introduction to Network Forensics 9 Hour


Handling Evidence-Cryptographic Hashes-Incident Response-Need for Forensic practitioners. Networking basics-Host side Artifacts-Services- Connections- Tools-netstat, nbstat- ifconfig-ntop- Task Manage/
Resource Monitor-ARP.
Unit-2 - Packet Capture and Analysis 9 Hour
Capture Packets- Packet Analysis with wireshark- Network Miner-Attack Types –SYN Floods- Malformed Packets- UDP floods- Amplification Attacks- Distributed Attacks- Backscatter-Vulnerability Exploits-Insider
Threats- Evasion- Application Attacks
Unit-3 - Location Awareness 9 Hour
Time zones- Using Whois- Traceroute-Geo Location- Location based services- Wifi Positioning- Preparing for Attacks-Netflow- Logging- Syslog- Windows Event Logs- Firewall Logs- Router and Switch Logs- Log
Servers and Monitors- Antivirus- Incident Response Preparation- Security Information and Event Management
Unit-4 - Intrusion Detection System 9 Hour
Detection Styles- Signature Based-Heuristic- Host based versus Network based- Snort- Suricata and Sagan- Bro- Tripwire-OSSEC- Architecture- Alerting
Unit-5 - Correlating Attacks 9 Hour
Packet Capture Times- Log Aggregation and Management- Timelines- Network Scanning- Port Scanning- Vulnerability Scanning- Port Knocking- Tunnelling- Passive Data Gathering

1. Network Forensics, Ric Messier, Wiley, ISBN: 978 -1-119-32828-5, August 2017 3. Computer Forensics: Investigating Network Intrusions and Cyber Crime, EC-Council.
Learning
2. Network Attacks and Exploitation: A Framework, Matthew Monte, Wiley, 2015 4. Network Forensics: Tracking Hackers through Cyberspace, Sherri Davidoff and Jonathan Ham,
Resources
Prentice Hall, 2015

557
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sankaranarayanan, Security Analyst, Philips 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr. J. Godwin Ponsam, SRMIST

558
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE536T MOBILE FORENSICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the challenges of mobile forensics and the process model on mobile device forensics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquire in-depth knowledge about smartphone acquisition and acquisition methods

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gain a solid understanding of iOS devices and guides to prepare the desktop machine for forensic work

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: explore the topics of Android model, file system, and its security features

Environment &
Sustainability
CLR-5: explore the types of evidence available on iOS, Android, Windows, and BlackBerry mobile devices

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the mobile forensics process model on mobile device forensics - - 2 - - - - - - - - - - - -
CO-2: plan and prepare the knowledge about smartphone acquisition and acquisition methods - - - - - - - 2 - - - - - - -
CO-3: acquire the knowledge on handling iOS devices - - 2 - - - - - - - - - - - 3
CO-4: utilize the concepts of Android model, file system, and its security features - - 2 - - - - - - - - - - - 3
demonstrate the ability to accurately document using Android Forensics, Windows Phone Forensics and
CO-5: - - - - - - - 2 - - - - - - -
BlackBerry Forensics

Unit-1 – Introduction 9 Hour


Introduction to Mobile Forensics -Mobile forensics – Mobile forensic challenges – Mobile phone evidence extraction process – Other sources of potential evidence -Lab:1 Study of Mobile Forensics and different
tools used for forensic investigation – Practical mobile forensic approaches – Mobile operating systems overview – Mobile forensic tool levelling system- Lab 2. Implement how to Recover Deleted Files using
Forensics Tools - - Data acquisition methods – Potential evidence stored on mobile phones – Good forensic practices- Lab 3: Forensics environment setup (Install Linux VM and intro to Linux command)
Unit-2 – iOS 9 Hour
Internals of iOS Devices and Data Acquisition from iOS Devices-iPhone models-iPhone operating system – The iOS architecture – iOS security -Address Space Layout Randomization – Lab 4: Using Android SDK
Tools (AVD to create simulator, ADB to explore the data, etc.)-Data Acquisition from iOS Devices – Physical acquisition – The forensic environment setup – Downloading iPhone Data Protection Tools – Building
the IMG3FS tool – Creating and loading the forensic toolkit – Establishing communication with the device – Lab 5: Android acquisition & analysis – Data Acquisition from iOS Backups -iTunes backup – Understanding
the backup structure – Unencrypted backup – Encrypted backup – iCloud backup -Extracting iCloud backups- Lab 6: Case study on iphone
Unit-3 – iOS Forensic Tools 9 Hour
iDevices from a Forensic Point of View – The iOS architecture – The iOS filesystem – iOS platform and hardware security – Identifying stored data – iOS acquisition and forensic approaches Lab 7: iOS forensics
setup – iOS Data Analysis and Recovery – Timestamps – SQLite databases – Important database files -Property lists – Important plist files- Cookies Lab 8:- iphone acquisition & analysis – iOS Forensic Tools –
Elcomsoft iOS Forensic Toolkit – Oxygen Forensic Suite 2014 – Cellebrite UFED Physical Analyzer – Paraben iRecovery Stick – Lab 9: Case study on Oxygen Forensic Suite

559
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 – Android Model 9 Hour
Android Forensic Setup and Pre Data Extraction Techniques – The Android model – Android security – Android file system -Extended File System – Android Software Development Kit – Android Debug Bridge -Lab
10: How to View Last Activity of Your PC- Accessing the device using adb – Handling an Android device – Screen lock bypassing techniques – Smudge attack – Lab 11: Comparison of two Files for forensics
investigation by Compare IT software – Gaining root access – Rooting an Android device – Imaging an Android Phone – Data extraction techniques – Lab 12: Live Forensics Case Investigation using Autopsy-
Android Data Recovery Techniques
Unit-5 – BlackBerry OS 9 Hour
Analysis and Overview of Forensic Tools on Android App,Windows Phone & Blackberry – Reverse engineering Android apps – Forensic tools overview – Windows Phone OS – Lab 13: windows phone acquisition
& analysis – Windows chambers – Windows Phone file system – Extracting the data – Lab 14 : BlackBerry Investigation – BlackBerry OS – Security features -Data acquisition – Creating a BlackBerry backup –
BlackBerry analysis – BlackBerry forensic image analysis – Forensic tools for BlackBerry analysis – Lab 15: Acquiring and Analyzing a BlackBerry device

1. Satish Bommisetty, Rohit Tamma, Heather Mahalik, Practical Mobile Forensics – 3. Mobile Forensics: Advanced Investigative Strategies, Oleg Afonin, Vladimir Katalov, Packt Publishing.
Learning
2014 Packt Publishing. 4. Lee Reiber, Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and
Resources
2. Soufiane Tahiri, Mastering Mobile Forensics, Packt Publishing. Presentation, Second Edition, 2 nd Edition,McGraw-Hill

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sankaranarayanan, Security Analyst, Philips 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr.M.Jeyaselvi, SRMIST
2. Dr. Raju Abraham, NIOT, Chennai 2. Mr. Joseph Raymond V, SRMIST

560
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE537T DIGITAL FORENSICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the history and purpose of digital forensics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquire in-depth knowledge about workings of computer hardware and the operating systems

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gain knowledge about disruptive technology that is challenging in digital forensic

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the Windows Registry as a resource of digital evidence

Environment &
Sustainability
CLR-5: explore the knowledge in rich resources of digital evidence

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the digital forensics process model - - - - 2 - - - - - - - - - -
CO-2: plan and prepare the knowledge about Hardware and Software Environments - - - - - - 2 - - - - - - - -
CO-3: acquire the knowledge on digital Forensic Tools - - - - 2 - 2 - - - - - - - 3
CO-4: apply the Digital Evidence in Windows OS - - - - 2 - - - - - - - - - 3
CO-5: demonstrate the ability to accurately document using rich resources of digital evidence - - - - 2 - 2 - - - - - - - -

Unit-1 - The Role of Digital Forensics and Its Environment 9 Hour


Understanding the history and purpose of forensics -Defining digital forensics and its role-Looking at the history of digital forensics-Studying criminal investigations and cybercrime-Outlining civil investigations and
the nature of e-discovery-The role of digital forensic practitioners and the challenges they face- Special Properties of Digital Evidence-The special characteristics and technical complexities of digital evidence.
Unit-2 - Hardware and Software Environments 9 Hour
Computers and the nature of digital information – Operating systems – Filesystems that contain evidence – Locating evidence in filesystems – Explaining password security, encryption, and hidden files -Case study
: linking the evidence to the user – Recovering and Preserving Digital Evidence – Understanding the chain of custody.
Unit-3 - Physical Acquisition and Safekeeping of Digital Evidence 9 Hour
Recovering digital evidence through forensic imaging processes -Acquiring digital evidence through live recovery processes -Outlining the efficacy of existing forensic tools and the emergence of enhanced processes
and tools -The Need for Enhanced Forensic Tools -Digital forensics laboratories -Emerging problems with datasets -Case study : Illustrating the challenges of interrogating large datasets
Unit-4 - Selecting and Analysing Digital Evidence 9 Hour
Structured processes to locate and select digital evidence – Locating digital evidence – Selecting digital evidence – Case study : Illustrating the recovery of deleted evidence held in volume shadows – Windows and
Other Operating Systems as Sources of Evidence – The Windows Registry and system files and logs as resources of digital evidence – Apple and other operating system structures – Remote access and malware
threats
Unit-5 - Examining Browsers 9 Hour
E-mails, Messaging Systems, and Mobile Phones – Locating evidence from Internet browsing – Messaging systems – E-mail analysis and the processing of large e-mail databases – The growing challenge of
evidence recovery from mobile phones and handheld devices -Case study : mobile phone evidence in a bomb hoax – Validating the Evidence – The nature and problem of unsound digital evidence ,Impartiality in
selecting evidence -The structured and balanced analysis of digital evidence ,Ethical issues confronting digital forensics practitioners

561
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Practical Digital Forensics – Richard Boddington [PACKT] Publication, Open-source 3. Nelson, B, Phillips, a, Enfinger, F, Stuart, C., “Guide to Computer Forensics and Investigations,
Learning community 2nd ed., Thomson Course Technology, 2006, ISBN: 0-619-21706-5.
Resources 2. Warren G. Kruse II and Jay G. Heiser, “Computer Forensics: Incident Response 4. Vacca, J, Computer Forensics, Computer Crime Scene Investigation, 2 nd Ed, Charles River
Essentials”, Addison Wesley, 2002. Media, 2005, ISBN: 1-58450-389.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sankaranarayanan, Security Analyst, Philips 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr.M.Jeyaselvi, SRMIST
2. Dr. Raju Abraham, NIOT, Chennai 2. Mr. Joseph Raymond V, SRMIST

562
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE538T SECURITY SCRIPTING AND ANALYSIS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: gain mastery in scripting application 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: practice computer network security scripting and packet analysis automation

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: apply the secure web app scripting development

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: analyze and practice exploit scripting and vulnerability analysis techniques

Environment &
Sustainability
CLR-5: analyze and expertise over the tool wireshark scripting

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: experience on scripting programming for network security - - 2 - - - - 2 - - - - - - -
CO-2: acquire knowledge on developing web servers and clients - - 2 - - - - - - - - - - - 3
CO-3: develop their own packet capturing and analyzing tools - - 2 - - - - 2 - - - - - - 3
CO-4: develop source code vulnerability detecting scripts - - 2 - - - - 2 - - - - - - -
CO-5: perform exploit analysis tools and network security analysis using packet capturing tools - - 2 - - - - - - - - - - - -

Unit-1 – Scripting Techniques 9 Hour


Introduction to Interpreted Language, Coding standards and data types, Mutable and immutable datatypes comparison in memory level, Variables, operators and Expressions, Program Structure and Control
statements, Loops - different types of for, while, Functions and lambda expression, Examples for different types functions, Classes, Objects and Other OOPS Concepts, Scope of variables-class level, instance level
and local, Inheritance and Overloading-types and examples, Exception handling, Introduction to IO streams and programming in file concepts, Directory Access and file traversing, Creation of Threads and its need,
Multithreading and Concurrency using locks and synchronization, Inter Process Communication (IPC, Permissions and Controls.
Unit-2 – Computer Network Security Scripting Techniques 9 Hour
Raw Socket programming, Packet injection using raw socket programming, Socket Libraries and its functionalities, Programming server clients using TCP, Asynchronous socket channels, Programming Servers
and Clients using UDP, Multithreaded server-TCP and UDP, Example programs applying multithreaded server concepts, Scapy Introduction, Packet crafting using scapy, Programming Wired Sniffers-scapy, Packet
injection –scapy wired, Programming Wireless Sniffers-scapy, Wireless sniffers examples, Programming arbitrary packet Injectors- wireless, Packet injection examples, Read and write to pcap file –scapy, Attack
automation using scapy
Unit-3 – Web App Security Scripting 9 Hour
Web Servers, Client side scripting, HTML basics, CGI scripts, Web Application Fuzzers, Types of fuzzing techniques, Types of fuzzing techniques, Scraping Web Applications- introduction, Remote file access -
Urlopen, urlretrive, Beautiful soup-urllib, HTML parsing, XML file analysis, Examples for XML file analysis, Web Browser Emulation- introduction, Mechanize- examples, Application Proxy, Own proxy creation,
Attacking Web Services, Examples for attacking web services.

563
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 – Computer Network Exploit Scripting and Vulnerability Analysis 9 Hour
Exploit Development techniques-introduction, Types of exploit development techniques, Immunity Debuggers and Libs, Attaching and detaching process, Writing plugins for Immunity debugger, Malware sample
analysis, Advanced exploitation techniques, Writing payloads for exploitation, Buffer overflow attack, Example with immunity debugger, Pyhook introduction, Examples for pyhook key loggers, Source code
vulnerability –introduction, Source code vulnerability analysis, Static source code vulnerability detection –scripting, Example scripts for static detection, dynamic source code vulnerability detection-scripting, Example
methods for dynamic detection.
Unit-5 – Computer Network Packet Analysis Scripting 9 Hour
Wireshark- introduction, Capturing methodologies, Capture filters, Display filters, Searching for packets using the Find dialog, Create new Wireshark profiles, Usage of Graphs, IO,TCP,Flow Graphs, Inspection of
Application Layer protocols, DNS,FTP, HTTP, SMTP, Colourcoding, Creation of colouringrules, Analyzing Transport Layer Protocol, TCP-UDP, Analyzing packets for security tasks, Security analysis methodology,
Scans and sweeps, ARP ICMP TCP UDP

1. Mike Dawson, More Python programming for Absolute Beginner, CengageLearning 3. Mastering Wireshark, PACKT Publishing, By Charit Mishra, March 2016
Learning PTR; 3rd edition, ISBN-10: 1435455002, ISBN-13: 978-14354550092, 2010. 4. James H.Baxter, Wireshark essentials, 2014
Resources 2. The Web Application Hacker’s Handbook, 2nd Edition, Wiley Publication, 5. TJ. O’Connor, Violent Python A Cookbook for Hackers, Forensic Analysts, Penetration Testers,
DafyddStuttard, Marcus Pinto and Security Engineers (2013), Elsevier

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sankaranarayanan, Security Analyst, Philips 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr.P.Savaridassan, SRMIST
2. Dr. Raju Abraham, NIOT, Chennai

564
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE539T PRINCIPLES OF SECURE CODING PRINCIPLES E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: discover the need for secure coding and proactive development process 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: demonstrate secure coding practices

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: implement automated tools to analyze and test the code for vulnerabilities

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: analyze input issues related to database and web

Environment &
Sustainability
CLR-5: incorporate fundamental principles of software security engineering

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the knowledge on secured software development and life cycle process - - 2 - - - - - - - - - - - -
CO-2: design secure software by incorporating security principles and mitigation strategies - - 2 - 2 - - - - - - - - - -
CO-3: analyze vulnerable code in implemented software and describe attack consequences - - 2 - 2 - - - - - - - - - 3
CO-4: apply mitigation and implementation practices to construct attack resistant web applications - - 2 - 2 - - - - - - - - - 3
CO-5: apply secure design principles for developing attack resistant software applications - - 2 - - - - - - - - - - - 3

Unit-1 - Secure Development Techniques 9 Hour


Introduction to secure coding principles, Need for secure systems - ideas for instilling Security culture and deploying Information Security culture frameworks, Attackers advantage and defenders dilemma, Proactive
security, Design phase considerations, Development and test phase considerations, Security principles to live by – SD3, Security principles, Secure design through threat modeling, Security Techniques, Threat
Modeling Tools, Security Into DevOps Processes.
Unit-2 - Secure Coding In C 9 Hour
Character strings- Common string manipulation errors – String Vulnerabilities and exploits –Mitigation strategies for strings, Obsolete functions, and secure functions by standards – Pointers, C Dynamic Memory
Management, Common errors in memory management, Instruction pointer modification, Targets for instruction pointer modification, Referencing Freed Memory, Mitigation strategies in pointer-based vulnerabilities
– Buffer Overflow based vulnerabilities.
Unit-3 - Secure Coding in C++ and Java 9 Hour
Dynamic memory management- Common errors in dynamic memory management- Memory managers, Double–free vulnerabilities, Integer Security-Mitigation strategies, Tools to check code for common
programming errors - Static code checkers, Runtime code checkers.
Unit-4 - Database and Web Specific Input Issues 9 Hour
Quoting the Input – Use of stored procedures- SQL injection – Anatomy of the vulnerability, Building SQL statements securely-XSS related attacks and remedies, Web Server and Database Attacks and
Countermeasures.
Unit-5 - Software Security Engineering 9 Hour
Requirements engineering for secure software: Misuse and abuse cases-SQUARE process model- Software security practices and knowledge for architecture and design.

565
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
1. Michael Howard, David LeBlanc, “Writing Secure Code”, Microsoft Press, 2nd Edition, 2003. 4. David A. Wheeler, “Secure Programming for Linux and Unix HOWTO”
Learning 2. Robert C. Seacord, “Secure Coding in C and C++”, Pearson Education, 2nd edition, 2013. 5. Bryan Sullivan, Vincent Liu, “Web Application Security – A Beginner’s Guide”
Resources 3. Julia H. Allen, Sean J. Barnum, Robert J. Ellison, Gary McGraw, Nancy R. Mead, “Software 6. Ron Ben Natan, “Implementing Database Security and Auditing: A guide for DBAs,
Security Engineering: A guide for Project Managers”, Addison-Wesley Professional, 2008. Information security administrators and auditors”, Published by Elsevier Inc., 2005

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Praveen Kumar, Team Lead, Cognizant Technology Solutions. 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr. Savaridassan.P, SRM IST
2. Dr. Raju Abraham, NIOT, Chennai 2. Mr. Joseph Raymond V, SRM IST

566
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE540T ANDROID SECURITY AND DESIGN INTERNALS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the Android Security Model 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: develop the android security design and architecture

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: identify various Android attacks and hacking methods

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the User Space Software and Return Oriented Programming

Environment &
Sustainability
CLR-5: demonstrate Network Security and PKI, Enterprise Security and Device Security

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the Android Security Model 2 2 - 2 - - - - - - - - - - -
CO-2: develop the android security design and architecture 2 2 - - - - - - - - - - - - -
CO-3: explore Android attacks and hacking methods - 2 - 2 - - - - - - - - - - 3
CO-4: understand the User Space Software and Return Oriented Programming - 2 - 2 - - - - - - - - - - 3
CO-5: demonstrate Network Security and PKI, Enterprise Security and Device Security 2 - - 2 - - - - - - - - - - -

Unit-1 - Android’s Security Model 9 Hour


Android’s Security Model – Android Architecture, Android’s Security Model. Permissions – The Nature of Permission, Requesting Permission, Permission Management, Permission Protection Levels, Permission
Assignment, Permission Enforcement, System Permission, Shared user ID, Custom Permission, Public and Private components, Activity and Service Permission, Broadcast Permission, Content Provider Permission.
Package Management – Android Application package format, Code signing, APK Install Process, Package verification. User Management – Multiuser support overview, Type of users, user management, user
metadata, Per User Application Management, External Storage, Other Multiuser features
Unit-2 - Android Security Design and Architecture 9 Hour
Android Security Design and Architecture - Understanding Android System Architecture, Understanding Security Boundaries and Enforcement, Complex Security, Complex Exploits. Rooting Your Device -
Understanding the Partition Layout, Understanding the Boot Process, Locked and Unlocked Boot Loaders, Rooting with an Unlocked Boot Loader, Rooting with a Locked Boot Loader, History of Known Attacks.
Reviewing Application Security - Common Issues, Case Study: Mobile Security App, Case Study: SIP Client.
Unit-3 - Android Attacks and Hacking 9 Hour
Understanding Android’s Attack Surface - An Attack Terminology Primer, Classifying Attack Surfaces, Remote Attack Surfaces, Physical Adjacency, Local Attack Surfaces, Physical Attack Surfaces, and Third-Party
Modifications. Finding Vulnerabilities with Fuzz Testing -Fuzzing Background, Fuzzing on Android, Fuzzing Broadcast Receivers, Fuzzing Chrome for Android, Fuzzing the USB Attack Surface. Debugging and
Analyzing Vulnerabilities – Choosing a Tool Chain, Debugging with Crash Dumps, Remote Debugging, Debugging Dalvik Code, Debugging Native Code, Debugging Mixed Code, Alternative Debugging Techniques,
Vulnerability Analysis.
Unit-4 - User Space Software 9 Hour
Exploiting User Space Software - Memory Corruption Basics, A History of Public Exploits, Exploiting the Android Browser. Return Oriented Programming - History and Motivation, Basics of ROP on ARM, Case
Study: Android 4.0.1 Linker. Hacking and Attacking the Kernel - Android’s Linux Kernel, Extracting Kernels, Running Custom Kernel Code, Debugging the Kernel, Exploiting the Kernel.

567
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-5 - Network Security and PKI 9 Hour
Cryptographic Providers - JCA Provider Architecture, JCA Engine Classes, Android JCA Providers, Using a Custom Provider. Network Security and PKI - PKI and SSL Overview, JSSE Introduction, Android JSSE
Implementation. Credential Storage - VPN and Wi-Fi EAP Credentials, Credential Storage Implementation, Public APIs. Online Account Management - Android Account Management Overview, Account Management
Implementation, Google Accounts Support. Enterprise Security – Device Administration, VPN Support, Wi-Fi EAP. Device Security - Controlling OS Boot-Up and Installation, Verified Boot, Disk Encryption, Screen
Security, Secure USB Debugging, Android Backup.

1. Android Security Internals – An In-depth Guide To Android’s Security Architecture, 4. Android Security: Attacks and Defenses, Anmol Misra, Abhishek Dubey, CRC Press, ISBN
by Nikolay Elenkov, No Starch Press 9780367380182
Learning 2. Android™ Hacker’s Handbook, Joshua J. Drake, Pau Oliva Fora, Zach Lanier, Collin 5. Android Security Cookbook, Keith Makan , Scott Alexander-Bown, December 2013, ISBN:
Resources Mulline, Stephen A. Ridley, Georg Wicherski, Welly, ISBN: 978-1-118-60864-7 9781782167167
3. Android Security (and Not) Internals, Yury Zhauniarovich, June 2014 6. Android Application Security Essentials, Pragati Ogal Rai, Packt Publishing (21 August 2013), ISBN:
978-1849515603

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. N. Arun, Senior Software Engineer, Quick Heal 1. Dr. Vigneshwaran P, SRMIST

568
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

UNDERGRADUATE/ INTEGRATED POST


GRADUATE DEGREE PROGRAMMES
(With exit option of Diploma)

(Choice Based Flexible Credit System)

Regulations 2021

Volume – 11N
(Syllabi for M.Tech (Integrated) Computer Science and
Engineering w/s in Data Science Programme Courses)

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

569
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Core Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

570
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC501T NATURAL LANGUAGE PROCESSING TECHNIQUES C PROFESSIONAL CORE
Code Name Category 3 1 0 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: familiarize the basic concepts of NLP 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: inculcate the knowledge of preprocessing techniques of NLP

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: build probabilistic language models

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: brief about syntax and semantic techniques

Environment &
Sustainability
CLR-5: design the application models of NLP

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand Ambiguity of NLP, Challenges, and applications of NLP - - - - - - - - - - - - 1 - -
CO-2: illustrate NLP Techniques such as POS, Morphology, text Preprocessing - - - - - - - - - - - - - 2 -
CO-3: develop applications of probabilistic models - - - - - - - - - - - - - - 3
CO-4: analyze the concepts of syntax and semantics in NLP - - - - - - - - - - - - - 2 -
CO-5: implement the applications of NLP using Machine Learning and Deep Learning model - - - - - - - - - - - - - - 3

Unit-1 - NLP Overview 12 Hour


History of NLP, Applications of NLP, Information Retrieval, Information Extraction, Question Answering, Sentiment Analysis, Optical Character Recognitions Summarization Spell and Grammar Checking. Text
Categorization word prediction speech recognition Machine Translation, Classification of NLP, Ambiguity Lexical Ambiguity, Syntactic Ambiguity, Semantic Ambiguity, Pragmatic Ambiguity, NLP Terminology,
Components of NLP
T1: NLP Packages
T2: Preprocessing of Text
T3: Language Model
Unit-2 - NLP Technique 12 Hour
NLP Technique, Parts of speech, Rule based POS, HMM POS, Formatting Hidden, Markov Model Taggers, Phonology, Veterbi Algorithm for HMM Tagging, Probabilistic Speech Recognition, Morphology, Finite
state Morphological Parsing, Text Preprocessing, Tokenization, Stemming, Lemmatization, Regular expressions, Finite State Automata, Deterministic Automata, Non-Deterministic Automata.
T4: Implementation of POS Tagging
T5: Tools of Morphology
T6: Implementation of Regular Expression

571
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-3 - Probabilistic Language Model 12 Hour
Potter Stemmer, Detection and Correction of Spelling Errors, Minimum Edit Distance, Application of Probabilistic of Model, Bag of words with N-Gram, The Chain Rule, Language model with N-Gram, N-Gram,
Language Model applications, Unigram model, Bigram Model, Unsmoothed N-Grams, Evaluating N-Grams perplexity, Smoothing: Laplace Smoothing, Interpolation, Likelihood computation, Context free grammar,
Top Down parsing.
T7: Spelling Correction
T8: N-Gram Model
T9: Probabilistic Language Model
Unit-4 - Natural Language and Neural Networks 12 Hour
Introduction to Neural Networks, Network Architecture, Recurrent Neural Networks in NLP, WordSense, WordNet, Learning Representation, Back propagation errors, Vectorization, Information extraction, Backdrop,
Dependency Parsing, Fast and Accurate Dependency Parser using Neural Networks, Globally Normalized Transition Based Neural Networks.
T10: NN Architecture
T11: Distributed Representation
T12: Word embedding
Unit-5 - NLP and Deep Learning 12 Hour
Introduction to NLP and Deep Learning, Word Vectors, Distributed Representations of Words and Phases, Word representations in vector space Word vector, Glove vectors for word representation, improving
distributional similarity, Evaluation methods for Unsupervised word embedding.
T13: Pretrained Language model
T14: Transfer Learning
T15: Long Short-Term Memory

1. Daniel Jurafsky and James H Martin. Speech and Language Processing, 2e, Pearson 3. Bharati A., Sangal R., Chaitanya V... Natural language processing: a Paninian perspective,PHI,
Learning
Education, 2009 2000
Resources
2. James A... Natural language Understanding 2e, Pearson Education, 1994 4. Siddiqui T., Tiwary U. S... Natural language processing and Information retrieval, OUP 2008.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. R. Rajkumar, SRMIST

572
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSC502T APPLIED DEEP LEARNING C PROFESSIONAL CORE
Code Name Category 3 1 0 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the theoretical foundations, algorithms, and methodologies of convolutional neural networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: identify and apply appropriate recurrent neural networks for analyzing the data for variety of problems

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the principles and applications of computer vision

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: construct Generative Adversarial Networks to solve real - world problems

Environment &
Sustainability
CLR-5: understand different methodologies to create application using deep nets

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: recognize the characteristics of convolutional neural networks and the use of optimizers 2 3 3 - - - - - - - - - - - 3
CO-2: analyze various recurrent neural networks models 2 3 3 - - - - - - - - - - - 3
CO-3: apply the Deep Learning models for Computer Vision 2 3 3 - - - - - - - - - - - 3
CO-4: solve various real - world problems using Generative Adversarial Networks 2 3 3 - - - - - - - - - - - 3
CO-5: build a Deep Reinforcement Learning models for solving various problems 2 3 3 - - - - - - - - - - - 3

Unit-1 - Convolutional Neural Networks 12 Hour


Introduction to Convolutional neural networks – Autoencoders: types, denoising, Convolutional autoencoder example, Uses and limitations – Variational autoencoders: Parameters to define a normal distribution,
VAE loss function, Kullback-Leibler divergence, Training the VAE, The reparameterization trick – Applications of autoencoders – Optimizers: Gradient Descent, RMSProp, Adam
Tutorial:
T1. To build a convolutional autoencoder model for the MNIST dataset, T2. To build a convolutional variational autoencoders for the MNIST dataset, T3. Experiment with different learning rates and objective
functions for gradient descent
Unit-2 - Recurrent Neural Networks 12 Hour
Recurrent Neural Networks: Overview, Neural Networks with and without Hidden States, RNN-based Character-Level Language Models - Implementation: RNN Model, RNN-based Language Model, Gradient
Clipping, Training, Decoding - Long Short-Term Memory (LSTM), Gated Recurrent Units (GRU)
Tutorial:
T1. To implement the RNN model using the H. G. Wells’ The Time Machine data set. T2. To implement the LSTM model using the H. G. Wells’ The Time Machine data set. T3. To implement the GRU model using
the H. G. Wells’ The Time Machine data set
Unit-3 - Deep Learning for Computer Vision 12 Hour
Image Augmentation - Object Detection and Bounding Boxes - Anchor Boxes - Multiscale Object Detection - Region-based CNNs: R-CNNs, Fast R-CNN, Faster R-CNN, Mask R-CNN
Tutorial:
T1. To demonstrate object detection model banana detection dataset. T2. To implement the classification model for CIFAR-10 dataset. T3. To implement the classification model for Dog Breed Identification
dataset

573
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Generative Adversarial Networks 12 Hour
Generative Adversarial Networks: Generator, Discriminator, Loss function, Generator loss, Discriminator loss, Training - Deep Convolutional Generative Adversarial Networks: Wasserstein GAN, BEGAN, Cycle
GAN - Conditional GANs: Pix2Pix
Tutorial:
T1. To build a model using GAN to resemble MNIST digits. T2. To implement a Deep Convolutional GAN to generate complex color images. T3. To implement a Deep Convolutional GAN on Fashion-MNIST data
set using ReLU as activation function for generator, leaky ReLU as activation function for discriminator.
Unit-5 - Deep Reinforcement Learning 12 Hour
Stateless Algorithms: Na¨ıve Algorithm, ε-Greedy Algorithm, Upper Bounding Methods - The Basic Framework of Reinforcement Learning: Challenges, Simple Reinforcement Learning for Tic-Tac-Toe, Role of
Deep Learning, and a Straw-Man Algorithm
Tutorial:
T1. Self-Learning Robots - Case Study , T2. Building Conversational Systems: Deep Learning for Chatbots - Case Study, T3. Self-Driving Cars - Case Study

1. Iffat Zafar, Giounona Tzanidou, Richard Burton, Nimesh Patel, Leonardo Araujo, Hands-On 4. Ian Goodfellow, Yoshua Bengio and Aaron Courville, Deep Learning, the MIT
Convolutional Neural Networks with TensorFlow, Packt Publishing, 2018. (Unit I) Press, 2017.
Learning
2. Aston Zhang, Zack C. Lipton, Mu Li, Alex J. Smola, Dive into Deep Learning, arXiv preprint, 2021 5. Umberto Michelucci, Applied Deep Learning – A Case-Based Approach to
Resources
(http://d2l.ai/index.html) (Unit II, III & IV) Understanding Deep Neural Networks, Apress, 2018.
3. Charu C. Aggarwal, Neural Networks and Deep Learning - A Text Book, Springer Nature, 2018. (Unit 6. François Chollet, Deep Learning with Python, Manning Publications, 2018.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. N. Mohanraj, Software Engineer PayPal Inc., 1. Dr. M. Vinoth Kumar, Associate Professor, Department of Information Science 1. Dr. M. Prakash, SRMIST
and Engineering, Dayananda Sagar Academy of Technology & Management
2. Dr.G.Vadivu, SRMIST

574
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Elective Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

575
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE521T ADVANCED ALGORITHMS ANALYSIS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the fundamentals of algorithms and its complexity 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: analyse algorithm design strategies

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: implement graph and network algorithms

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: design the Parallel and Distributed algorithms

Environment &
Sustainability
CLR-5: utilize the search algorithms

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: develop algorithms and analyze its complexity 3 - - - - - - - - - - - - - -
CO-2: utilize appropriate design strategies - 3 - - - - - - - - - - - - -
CO-3: implement the graph and network algorithms - - 3 - - - - - - - - - - - -
CO-4: design and analysis of paradigms for sequential and parallel models - - 3 - - - - - - - - - - - -
CO-5: implement search algorithms - - 3 - - - - - - - - - - - -

Unit-1 - Introduction to Algorithms 9 Hour


Introduction to Preliminaries - Design and Analysis Fundamentals - Mathematical Tools for Algorithm Analysis - Trees and Applications to Algorithms - More on Sorting Algorithms - Probability and Average Complexity
of Algorithms.
T 1: Implementation of Sorting Algorithms
T 2: Implementation of Greedy algorithm
T 3: Implementation of Divide and Conquer algorithm
Unit-2 - Design Strategies 9 Hour
Major Design Strategies - The Greedy Method – Divide and Conquer - Dynamic Programming - Backtracking and Branch and Bound
T 4: Implementation of Dynamic Programming algorithm
T 5: Implementation of Backtracking algorithms
T 6: Implementation of Branch and Bound algorithms
Unit-3 - Graph and Network Algorithms 9 Hour
Graph and Network Algorithms - Graphs and Digraphs - Minimum Spanning Tree and Shortest Path Algorithms - Graph Connectivity and Fault-Tolerance of Networks - Matching and Network Flow Algorithms –
Case study on water management system
T 7: Implementation of Minimum spanning Tree
T 8: Implementation of Shortest Path algorithms
T 9: Implementation of Network Flow algorithm

576
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 - Parallel and Distributed Algorithms 9 Hour
Parallel and Distributed Algorithms - Introduction to Parallel Algorithms and Architectures - Parallel Design Strategies - Internet Algorithms -Distributed Computation Algorithms - Distributed Network Algorithms.
T 10: Implementation of Parallel algorithms
T 11: Implementation of Internet algorithms
T 12: Implementation of Distributed Network Algorithms
Unit-5 - Search Algorithms 9 Hour
String Matching and Document Processing - Balanced Search Trees - The Fast Fourier Transform - Heuristic Search Strategies: A* - Search and Game Trees 24 - Probabilistic and Randomized Algorithms - Lower-
Bound Theory - NP-Complete Problems - Approximation Algorithms – case study on bin packing, Dock management system.
T 13: Implementation of String-Matching Algorithms
T 14: Implementation of Randomized algorithms
T 15: Case study for NP Complete Problem

1. Kenneth A. Berman, Jerome L. Paul, “Algorithms: Sequential, Parallel, and Distributed”, 4. Michael Goodrich, Roberto Tamassia, “Algorithm Design” Wiley Student Edition
Amazon Bestsellers, 2004. 5. Horowitz, Sahni, Mehta: Fundamentals of Data Structures in C++, 2nd edition, University
Learning 2. Russ Miller, Laurence Boxer, “Algorithms Sequential and Parallel: A Unified Approach”, Press, 2007
Resources Prentice Hall, 1 edition, 1999.
3. Dimitri P. Bertsekas and John N. Tsitsiklis, “Parallel and Distributed Computation: Numerical
Methods”, Prentice Hall, 1989.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Radha R, SRMIST

577
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE522T FUNCTIONAL PROGRAMMING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the purpose of functional programming paradigm and Scala basic constructs 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: comprehend the different types of functions in scala

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: utilize traits and mixins in functional programming

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: learn the basics of lists and collections data structures

Environment &
Sustainability
CLR-5: explore the functors, monads, and monoids

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify and apply the appropriate construct in functional programming - - - - - - - - - - - - 2 - -
CO-2: construct programs using different types of functions - - - - - - - - - - - - - 2 -
CO-3: create programs using traits and mixins - - - - - - - - - - - - - 1 -
CO-4: construct programs using lists and different types of collections - - - - - - - - - - - - - - 1
CO-5: create programs using functors, monads, and monoids - - - - - - - - - - - - 2 - -

Unit-1 - Programming Paradigms 9 Hour


Different types of programming paradigms - Functional vs OOP-Scala Language Basics - Variables, Expressions, Functions-Recursion-Call By Name-Call By Value-Conditionals-Looping – for each and for -
Significance of vals- Classes - Types - Fields - Methods - Variable scope - Objects - Singleton object, Variables of objects
T1: Scala language basic constructs
T2: Loops and Classes in Scala
Unit-2 - Functions 9 Hour
Modules, Objects and Namespaces, Objects and Namespaces - Anonymous Functions - Polymorphic Functions, Nested Functions - Closures - Repeated Parameters - Tail Recursion - Define a tail recursive function
- Tracing tail recursive functions - Limits of tail recursive functions - Higher Order Functions Definition , Uses and Examples
T3: Scala language basic constructs
T4: Loops and Classes in Scala
Unit-3 - Interfaces 9 Hour
Traits Purpose and Syntax - Define a trait - Interface types - Interface types examples - Thick Interfaces - Thin Interfaces - Comparison of Thick vs Thin Interfaces - Ordered trait - Trait Comparisons - Traits for
modifying interfaces - Stacking modifications - Mixin Purpose & Composition, Example
T5: Mixin Development
T6: Trait Development

578
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-4 – Data Structures 9 Hour
Lists definitions and usage - Working with Lists - Constructing Lists - Basic operations on lists - head, tail, isEmpty demo - List Patterns - Lists First Order methods - Lists Higher Order methods - Sequences Overview
and operations - Tuples Overview and operations - Sets and Maps – Lists and Collections
T7: Lists and basic operations in lists
T8: Tuples and Collections
Unit-5 – Applicative Development 9 Hour
Functors Purpose and Use - Writing a simple functor - Functor Laws - Applicatives Concepts and use - Defining an applicative - Demo of Applicatives - Monads - Defining Monads - Monad Laws - Demo of Monads
and Monad Laws - Monoid Concept, Purpose, and Use - Examples of Monoid
T9: Applicatives development
T10: Traversable functors development

Learning 1. Chiusano.P,Bjarnason R,Functional Programming in Scala,Manning Publications,2015 3. Hortsmann, C., Scala for the Impatient, 2nd ed., Addison-Wesley, 2016.
Resources 2. Oderskey M, SpoonL, Venners B, Programming in Scala, Third edition. 4. Raychaudhuri R, Scala in Action, 1st ed. Manning Publications, 2013.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. K. Sornalakshmi, SRMIST

579
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE524T COMPUTER VISION TECHNIQUES E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
recognize and describe both the theoretical and practical aspects of computing with images.connect Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
issues from computer vision to human vision
describe the foundation of image formation and image analysis, Understand the basics of 2D and 3D

Environment & Sustainability


CLR-2:
Computer Vision

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


become familiar with the major technical approaches involved in computer vision, describe various
CLR-3:

Modern Tool Usage


methods used for registration, alignment, and matching in images

Life Long Learning


complex problems
Problem Analysis

Communication
CLR-4: get an exposure to advanced concepts leading to object and scene categorization from images
CLR-5: build computer vision applications

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand computer vision including fundamentals of image formation - - - - - - - - - - - - 2 - -
CO-2: learn about image formation - - - - - - - - - - - - - - 2
CO-3: apply image processing techniques - - - - - - - - - - - - 1 - 1
CO-4: calibrate computational photography - - - - - - - - - - - - - 1 -
CO-5: learn about Image rendering - - - - - - - - - - - - - - 1

Unit-1 - Introduction to Computer Vision 9 Hour


Review of image processing techniques – classical filtering operations – thresholding techniques – edge detection techniques – corner and interest point detection.
T1: Implementation of 2D and 3D Projections
T2: Build a color constancy algorithm that uses the assumption that the spatial average of reflectance is constant. Use finite-dimensional linear models.
Unit-2 – Image Formation 9 Hour
Points and patches-An Introduction - Binary shape analysis – connectedness – object labeling and counting – size filtering – distance functions – skeletons and thinning – deformable shape analysis – boundary
tracking procedures – active contours – shape models and shape recognition - Feature detectors -Feature descriptors, Matching - Feature tracking - Edge detection - Edge linking - Successive approximation -
Hough transforms -Hough Transform (HT) for line detection – foot-of-normal method – line localization – line fitting – RANSAC for straight line detection – HT based circular object detection – accurate center location
– speed problem – ellipse detection – Case study: Human Iris location – hole detection – generalized Hough Transform (GHT) – spatial matched filtering – GHT for ellipse detection – object location – GHT for
feature collation. Vanishing points
T3: Implementation Two-dimensional Fourier transforms, Wiener filtering
T4: Write a program that produces a Gaussian pyramid from an image

580
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-3 – Image Processing Techniques 9 Hour
Active contours - Snakes -Dynamic snakes and Condensation - Scissors, Level Sets - Split and merge - Mean shift and mode finding - Normalized cuts - Graph cuts and energy-based methods - 2D and 3D feature-
based alignment - Pose estimation
T5: Obtain an implementation of Canny’s edge detector
T6: Implement a Hough transform based line finder
Unit-4 – Computational Photography 9 Hour
Triangulation - Two-frame structure from motion - Projective reconstruction - Self-calibration - Perspective and projective factorization - Bundle adjustment - Exploiting sparsity - Constrained structure and motion -
Hierarchical motion estimation - Fourier-based alignment - Incremental refinement
T7: Count lines with an HT line finder. How well does it work?
T8: Implement a mean shift segmenter.
Unit-5 – Image Rendering 9 Hour
Motion models - Planar perspective motion - Rotational panoramas - Gap closing - Cylindrical and spherical coordinates - Bundle adjustment - Parallax removal - Recognizing panoramas – Compositing
T9: Case Study
T10: Case Study

1. RichardSzeliski,"Computer Vision: Algorithms and Applications”, Springer, 2010. 4. Rafael C. GonzaLez'"Digital Image Processing”, Pearson Education; Fourth edition (2018)
Learning 2. Forsyth/Ponce,"ComputerVision: AModernApproach”, PearsonEducationIndia;2edition (2015)
Resources 3. S. Nagabhushana,"Computer Vision and Image Processing”, NewAge International Pvt Ltd;
First edition (2005)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. N. Mohanraj, Software Engineer 2, Pay Pal Inc, Chennai 1. Dr. A.P.Shanthi , CEG Campus Anna University 1. Dr.T.Veeramakali, SRMIST

581
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE527T TEXT MINING AND ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the fundamentals of text mining 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: utilize text for prediction techniques

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the relevance between information retrieval and text mining

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: understand the goals of information extraction

Environment &
Sustainability
CLR-5: analyze different case studies related to text mining

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire knowledge on fundamentals of text mining - - - - - - - - - - - - 1 - -
CO-2: perform prediction from text and evaluate it - - - - - - - - - - - - - 2 -
CO-3: perform document matching - - - - - - - - - - - - - 2 -
CO-4: identify patterns and entities from text - - - - - - - - - - - - - 2 -
CO-5: understand how text mining is implemented - - - - - - - - - - - - - - 1

Unit-1 - Overview of Text Mining 9 Hour


Overview of text mining-Special about Text Mining-Structured Data-Unstructured Data-Is text different from numbers-Types of Problem can be solved. -Document Classification-Informational Retrieval-Prediction
and Evaluation From Textual Information to Numerical Vectors-Collecting Documents-Document Standardization-Tokenization-Lemmatization-Inflectional Stemming-Stemming to a Root-Vector Generation for
Prediction-Multiword Features
T1 - String Tokenization- Stemming
T2- Root vector Generation
T3 – Multiword Features
Unit-2 - Textual Predication 9 Hour
Labels for the Right Answers-Feature selection by attribute ranking-Sentence-Boundary Determination-Part of speech Tagging-Word Sense Disambiguation-Phrase Recognition-Named Entity Recognition-Parsing-
Feature Generation-Using text for prediction-Recognizing that document Fit a pattern-Document Classification-Learning to Predict from Text-Similarity and Nearest-Neighbor Method-Document Similarity-Decision
Rules-Decision Trees-Scoring by Probabilities
T4 - Attribute Ranking using Feature Selection
T5 – Text Similarity Practice
T6- Decision Tree

582
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-3 - Information Retrieval for Text Mining 9 Hour
Linear scoring Methods-Evaluation of Performance-Estimating current and future performance-Getting the most from a Learning Method-Errors and Pitfalls in Big data Evaluation-Graph models for social Networks-
Information Retrieval and Text Mining-Keyword Search-Nearest- Neighbor Methods-Measuring Similarity-Shared Word Count-Word count and Bonus-Cosine Similarity-Web based Document Search-Link Analysis-
Document Matching-Inverted List-Evaluation of Performance
T7- Assigning Scores using Linear Scoring method,
T8 - Finding Cosine Similarity of Given Text
T9 – Web Based Document Search
Unit-4 - Finding Structure in Document Collection 9 Hour
Clustering Documents by similarity-Similarity of composite documents-K-means Clustering-Hierarchical Clustering-The EM Algorithm-Goals for Information Extraction-Finding Patterns and Entities from Test-Entity
Extraction as Sequential Tagging-Tag Prediction as Classification-The maximum Entropy method-Linguistic Features and Encoding-Local Sequence Prediction Models-Global sequence Prediction Models-Reference
and relationship Extraction-Template Filling And Database Construction-Commercial Extraction System: Application-Criminal Justice : Application-Intelligence Application
T10- Implementing K-means Clustering
T11- EM Algorithm implementation
T12 – Template Filling and Database Construction practice
Unit-5 - Case Studies 9 Hour
Ideal Model of Data-Practical Data Sourcing-Prototypical Examples-Hybrid Example-Mixed Data in Standard Table Format-Case study: Market Intelligence from the web-Case Study: Lightweight Document Matching
for Digital Libraries-Generating Model cases for Help desk Application: case study-Assigning topics to news articles: Case study-E-mail Filtering: Case study-Search Engines : case study Extracting Named Entities
from Documents-Mining Social Media-Customized Newspapers-Emerging Directions-Different ways of collecting samples-Learning to-Unlabeled data-Distributed Text Mining
T13- Case study Analysis for Search Engines
T14- Hybrid Exercise Practice
T15- social media – Data customized

1. By Sholom M. Weiss, Nitin Indurkhya, Tong Zhang.,Fundamentals of Predictive Text Mining 2010 3. Springer- ISBN:9781849962261, 184996226X
Learning
2. Text Mining Classification, Clustering, and Applications,By Ashok N. Srivastava, Mehran
Resources
Sahami,2009

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms.Sabna Sulamain,Nokia 1. Dr.M.Venkatestan, IITM 1. Dr.A.Murugan,SRMIST

583
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Course Course Course L T P C
21CSE529T WEB INTELLIGENCE E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the Environment and Foundations of Business Intelligence 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: know to explore Web Usage Data Pre-processing

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: utilize Sentimental Analysis in applications

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis

Communication
CLR-4: explore the Web Usage Based Adaptive Systems

Environment &
Sustainability
CLR-5: implement Recommender Systems in applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: discover Foundations in Web Intelligence - - - - - - - - - - - - - 1 -
CO-2: explore web Usage data Preprocessing and its tools - - - - - - - - - - - - - - 2
CO-3: explore and Implement Sentimental Analysis using Web intelligence - - - - - - - - - - - - 2 - -
CO-4: implement Web Usage Based Adaptive Systems - - - - - - - - - - - - - - 1
CO-5: develop Web Intelligence based Recommendation Systems - - - - - - - - - - - - - - 1

Unit-1 - Introduction: Web Intelligence 9 Hour


Web Information System Environment and Foundations: Web information description and query languages- the semantic Web-Web information system development tools, Web Human-Media Engineering: Web
page design-information representation-information processing-visualization of Web information, Web Information Management: information transformation, Internet and Web-based data management: OLAP (on-
line analytical processing)- Web knowledge management- web page automatic generation and updating-Web security, integrity, privacy and trust. The Web Operation- Parsing Common Document Types:
Representing Styled Text- Approaches for Modeling the Web User Behaviour
T1: Ruby’s TextResource class: Plain Text, Binary Document Formats, HTML and XHTML, OpenDocument, RSS
T2: Handling Document Formats (PDF)
T3: Handling Document Formats (Word)
Unit-2 - Web Usage Data Pre-Processing 9 Hour
Data Sources and Collection: Nature of Web Usage Data- Merging and Cleaning Data, Web Session Reconstruction and User Identification: Heuristics and Methods for Sessionization- Dealing with Incomplete
Information- Model Assessment for Sessionization Algorithms. Discovering Usage Patterns for Web: Web Usage Data Collection- Web Usage Data Preprocessing- Web Usage Pattern Discovery - Application of
Web Usage Patterns.
Cleaning, Segmenting, and Spell-Checking Text: Extracting All Text from Any XML File- Segmenting Text- Stemming Text.
T4: Spell-Checking Text
T5: Recognizing and Removing Noise Characters from Text
T6: Custom Text Processing

584
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
Unit-3 - Sentimental Analysis 9 Hour
Web Opinion Mining (WOM): Aspect-Based Opinion Mining- Document Level Opinion Mining. Sources for Web Opinion Mining: Blogs, News and Forums, Twitter, Other Media. Natural Language Processing:
Automating Text Categorization: Using Word-Count Statistics for Categorization- Bayesian Classifier for Categorization- LSI for Categorization, Clustering Text Documents: K-means Document Clustering
T7: Supporting Indexing and Search.
T8: Using Web Scraping to Create Semantic Relations.
T9: Taking Advantage of Linked Data
Unit-4 - Web Usage Based Adaptive Systems 9 Hour
An Overview on Web Usage Based Adaptive Systems- Web Usage Based Adaptive Systems Evolution- Process Framework: Domain Model- User Model- Adaptation Model- Approaches for Web Usage Based
Systems: Content Adaptation- Navigation Adaptation- Presentation Adaptation- Privacy Issues in User Data Collection and Usage.
T10: Using RDF and RDFS Data Formats
T11: Data Quality Evaluation Tweets Performing SPARQL Queries
T12: Code Implementing SPARQL Endpoint Web Portals
Unit-5 - Recommender Systems 9 Hour
Introduction - Classification of Recommender Systems: Rule-Based Recommender Systems- Content-Based Recommender Systems- Collaborative Filtering Recommender Systems- Hybrid Recommender Systems-
Sources of Knowledge for Recommender Systems: Ratings- Implicit Feedback- Social Tags- Online Social Networks – Context- Heterogeneous Sources of Knowledge.
Evaluation Metrics for Recommender Systems: Prediction-Based Metrics- Information Retrieval Related Metrics- Diversity, Novelty and Coverage-
T13: Learning user profiles
T14: Extracting Significant Information from Tweets
T15: Combining the TextResource Class with NLP

1. Marks Watson, “Scripting Intelligence: Web 3.0 Information Gathering and Processing”, Apress,2009 4. Shroff, Gautam (January 2014). The Intelligent Web: Search, smart algorithms,
Learning 2. Juan D. Velásquez, Vasile Palade, and Lakhmi C. Jain,” Advanced Techniques in Web Intelligence-2 Web and big data, Oxford University Press
Resources User Browsing Behaviour and Preference Analysis” 5. Richard Chbeir, Youakim Badr, Ajith Abraham Aboul-Ella Hassanien,” Emergent
3. Ning Zhong, Jiming Liu, Yiyu Yao,” Web Intelligence”,Springer, 2003 Web Intelligence: Advanced Information Retrieval” Springer,2010

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Paul T Sheeba, SRMIST

585
B.Tech / M.Tech (Integrated) Programmes-Regulations 2021-Volume-11-CSE-Higher Semester Syllabi-Control Copy
SRM INSTITUTE OF SCIENCE AND TECHNOLOGY
(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203 , Tamil Nadu,


India

You might also like