Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Course Code Course Title Number of Credits Prerequisites (Course code) Course Type : CSOE401 : SOFTWARE ENGINEERING : 3 : Nil : OE Learning Objectives To understand software process models such as waterfall and evolutionary models To learn about software requirements specification document To understand different software architectural styles To understand software testing approaches like unit testing, integration testing etc. To introduce various software quality control activities Course Content UNIT- I Introduction to Software Engineering: The evolving role of software, Changing Nature of Software, Software myths. A Generic view of process: Software engineering- A layered technology, a process framework, The Capability Maturity Model Integration (CMMI), Process patterns, process assessment, personal and team process models. Process models: The waterfall model, Incremental process models, Evolutionary process models, The Unified process. UNIT-II Software Requirements: Functional and non-functional requirements, User requirements, System requirements, Interface specification, the software requirements document. Requirements engineering process: Feasibility studies, Requirements elicitation and analysis, Requirements validation, Requirements management. System models : Context Models, Behavioural models, Data models, Object models, structured methods. UNIT - III Design Engineering: Design process and Design quality, Design concepts, the design model. Creating an architectural design: Software architecture, Data design, Architectural styles and patterns, Architectural Design. Object-Oriented Design: Objects and object classes, An Object-Oriented design process, Design evolution. Performing User interface design: Golden rules, User interface analysis and design, interface analysis, interface design steps, Design evaluation. UNIT- IV Testing Strategies: A strategic approach to software testing, test strategies for conventional software, Black-Box and White-Box testing, Validation testing, System testing, the art of Debugging. Product metrics: Software Quality, Metrics for Analysis Model, Metrics for Design Model, Metrics for source code, Metrics for testing, Metrics for maintenance. Metrics for Process and Products : Software Measurement, Metrics for software quality. Risk management: Reactive vs. Proactive Risk strategies, software risks, Risk identification, Risk projection, Risk refinement, RMMM, RMMM Plan. UNIT-V Quality Management: Quality concepts, Software quality assurance, Software Reviews, Formal technical reviews, Statistical Software quality Assurance, Software reliability, The ISO 9000 quality standards. Text Books 1. Pressman, R.S. and Pressman (2004) Software engineering: A practitioner’s approach. 6th edn. Boston, MA: McGraw Hill Higher Education. 2. Sommerville, I. (2006) Software engineering. 7th edn. Harlow, England: AddisonWesley Educational Publishers. Reference Books 1. Jalote, P. (2010) Software engineering: A precise approach. Daryaganj, New Delhi: Wiley India. 2. Jawadekar,W.S.(2008)."Software Engineering: A Primer",New Delhi: Tata McGrawHill. 3. Mall, R. (2014) Fundamentals of software engineering. India: Prentice-Hall of India. Learning Outcomes: Upon successful completion of the course the student will be able to: • • • • • Identify the software requirements using various requirements gathering techniques Design and develop SRS document Choose the suitable process model for a software application Develop, maintain, efficient, reliable and cost effective software solutions Measure the software developed Course Code Course Title Number of Credits Prerequisites Course Type : : CSOE402 NETWORK SECURITY : : : 3 CSPC305 OE Learning Objectives To learn the technologies , methodologies and protocols to secure computer networks To introduce various cryptographic algorithms To provide the basics of public key encryption and number theory To know authentication, Hash functions and Digital signatures To know the network security tools and applications To understand the System security, Transport layer security, IP security, Wireless LAN security and Application level security Course Content UNIT- I OSI Security Architecture Security Attacks, Security Services, Security Mechanisms and A model for Network Security. Classical Encryption Techniques Symmetric Cipher Model, Substitution Techniques, Transposition techniques and Steganography UNIT- II Data Encryption Standards Block Cipher principles, DES algorithm and Examples, Strength of DES, Block Cipher design Principles .Block Cipher Operations Modes of operations, ECB,CBC,CF,OF and Counter Mode, Multiple Encryption and Triple DES. Advanced Encryption Standards AES Structure ( Encryption and Decryption), AES Transformation Functions Introduction to number Theory .Prime Numbers, Fermat’s and Euler’s Theorem UNIT- III Public-Key Cryptography Principles of Public-Key Cryptosystems, RSA Algorithm. Other Public-Key Cryptosystems Diffie-Hellman Key Exchange, ElGamal Cryptographic system, Elliptic Curve Cryptography, ElGamal Cryptographic Hash Functions Authentication, Message Authentication Functions, Message Authentication Requirements, Applications of Cryptographic Hash Functions, Two Simple Hash Functions, MD5 and SHA-1 algorithms, MACs based on Hash functions(HMAC). UNIT- IV Digital Signatures Properties, Attacks and Forgeries, Digital Signature requirements, Direct Digital Signature, DSA algorithm . Key Management and Distribution Symmetric Key Distribution Using Symmetric Encryption, Symmetric Key Distribution Using Asymmetric Encryption, Distribution ofPublic keys, X.509 Certificate format, Forward Certificate and reverse Certificate. User Authentication Remote user Authentication Principles, Remote user-Authentication using Symmetric and AsymmetricEncryption, Kerberos Authentication protocol UNIT- V Transport Level Security ,Web Security, SSL Architecture, Secure Shell(SSH), SET. Wireless LAN Security and E-mail Security IEEE 802.11i Wireless LAN Security, Wireless Transport layer Security, PGP, S/MIME. IP Security IP Security Overview, IP Security Policy, Encapsulating Security Payload, Combining Security Associations. System Security Intruders, IDS, Password Management, Malicious Software, Firewalls, Firewall characteristics, Types of firewalls, Firewall Basing Text Book 1. Stallings, W. (2011) Cryptography and network security: Principles and practice. 5th edn. Boston: Prentice Hall. Reference Books 2. Stallings, W. (2013) Network security essentials: Applications and standards. 4th edn. Boston: Prentice Hall. 3. Kahate, A. (2003) Cryptography and network security. New Delhi: Tata McGraw-Hill Pub. 4. Mao, W. (2003) Modern Cryptography: Theory and practice (paperback). 8th edn. United States: Pearson Education. Learning Outcomes Upon successful completion of the course the student will be able to: Identify Vulnerabilities ,different types of threats and Risk Write code for relevant cryptographic algorithms and Digest algorithms Know security tools like Crypt , Wireshark and Cain Send and receive secure mails Understand SET,SSL & S/MIME protocols Determine firewall requirements, and configure a firewall Course Code Course Title Number of Credits Prerequisites Course Type : : : : : CSOE403 ARTIFICIAL INTELLIGENCE 3 Nil OE Learning Objectives: To provide an understanding of abstractions and reasoning techniques used in AI. To introduce intelligent agents To enhance students skills like Problem solving, Knowledge and Reasoning, Planning, Uncertainty and Learning. Course Content UNIT-I What is AI?, Agents and Environments, Good Behavior: The Concept of Rationality, The Nature of Environments, The Structure of Agents, Problem-Solving Agents, Example Problems, Searching for Solutions. UNIT-II Uninformed Search strategies, Avoiding Repeated States, Searching with Partial Information, Informed (Heuristic) Search Strategies, Heuristic Functions, Local Search Algorithms and Optimization Problems, Constraint Satisfaction Problems, Backtracking Search for CSPs, Local Search for Constraint Satisfaction Problems, The Structure of Problems. UNIT-III First Order Logic: Representation, Syntax and Semantics of First-order logic, Using First-order logic, Knowledge Engineering in First-Order Logic, Propositional Vs. First-Order Inference, Unification and Lifting, Forward Chaining, Backward Chaining, Resolution, Ontological Engineering, Categories and Objects, Actions, Situations and Events. UNIT-IV The Planning Problem, Planning with State-Space Search, Partial-Order Planning, Planning Graphs, Planning with propositional logic, Analysis of Planning Approaches, Acting under Uncertainty, Basic Probability Notation, The Axioms of Probability, Inference using Full Joint Distributions, Independence, and Baye’s Rule and its Use. UNIT-V Forms of Learning, Inductive Learning, Neural Networks, Kernel Machines Text Book 1. Russell, S.J., Norvig, P. and Davis, E. (2003) Artificial intelligence: A modern approach. 2nd edn. Boston: Prentice Hall. Reference Book 1. Rich, E. and Knight, K. (1991) Artificial intelligence. 2nd edn. New York: McGraw-Hill Publishing. Learning Outcomes Upon successful completion of the course the student will be able to: Represent any problem as a state space search Solve problems using uninformed and informed search techniques Specify the Time & Space Complexity of Algorithms like BFS, DFS, IDFS Solve constraint satisfaction problems like map coloring Represent knowledge as first-order logic, Propositional logic Solve problems using planning algorithms like GRAPHPLAN Course Code Course Title Number of Credits Prerequisites Course Type : : : : : CSOE404 DATA WAREHOUSING AND DATA MINING 3 CSPC207 OE Learning objectives To provide concepts of Data Warehousing and Data Mining. To learn the architecture of Data Mining system and Data warehouse. To introduce various data mining methods like Data preprocessing, Classification and Prediction. Course Content UNIT- I Data Warehousing and Business Analysis - Data warehousing Components, Building a Data warehouse, Data Warehouse Architecture, DBMS Schemas for Decision Support, Data Extraction, Cleanup, and Transformation Tools, Metadata, Query tools and Applications, Online Analytical Processing (OLAP), OLAP and Multidimensional Data Analysis. UNIT- II Data Mining: - Data Mining Functionalities, Data Preprocessing, Data Cleaning, Data Integration and Transformation, Data Reduction, Data Discretization and Concept Hierarchy Generation, Architecture Of A Typical Data Mining Systems, Classification Of Data Mining Systems. Association Rule Mining- Efficient and Scalable Frequent Item set Mining Methods, Mining Various Kinds of Association Rules, Association Mining to Correlation Analysis, ConstraintBased Association Mining. UNIT- III Classification and Prediction - Issues Regarding Classification and Prediction, Classification by Decision Tree Introduction, Bayesian Classification, Rule Based Classification, Classification by Back propagation, Support Vector Machines, Associative Classification, Lazy Learners, Other Classification Methods, Prediction, Accuracy and Error Measures, Evaluating the Accuracy of a Classifier or Predictor, Ensemble Methods, Model Section. UNIT- IV Cluster Analysis -Types of Data in Cluster Analysis, A Categorization of Major Clustering Methods, Partitioning Methods, Hierarchical methods, Density-Based Methods, Grid-Based Methods, Model-Based Clustering Methods, Clustering High-Dimensional Data, ConstraintBased Cluster Analysis ,Outlier Analysis. UNIT- V Mining Object, Spatial, Multimedia, Text and Web Data-Multidimensional Analysis and Descriptive Mining of Complex Data Objects, Spatial Data Mining, Multimedia Data Mining, Text Mining, Mining the World Wide Web. Text Book 1. Han, J., Kamber, M. and Pei, J. (2011) Data mining: Concepts and techniques. 3rd edn. New Delhi, India: Elsevier. Reference Books 1. Berson, A. and Smith, S.J. (1997) Data warehousing, data mining, and OLAP. New York: McGraw-Hill Inc. 2. Soman, K.P., Diwakar, S. and Ajay, V. (2006) Insight into data mining: Theory and practice. New Delhi: Prentice-Hall. 3. Gupta, G.K. (2011) Introduction to data mining with case studies. 2nd edn. New Delhi, India: Prentice-Hall. Learning Outcomes Upon successful completion of the course the student will be able to: Differentiate OLAP and OLTP Apply various DM techniques Use various tools used in data mining Course Code Course Title No of Credits Prerequisites Course Type : : : : : CSOE405 DATABASE MANAGEMENT SYSTEMS 4 Nil OE Learning Objectives To learn relation database models To explore conceptual and relational database designs like ER diagrams, relational algebra. To write SQL commands in any of the RDBMS To learn about Query Processing and Transaction Processing Course Content UNIT-I Overview of Database Systems- Overview of a Database Management System-Database design and ER diagramsl: Elements of the E/R Model-Design Principles-The Modeling of ConstraintsWeak Entity Sets UNIT- II Basics of the Relational Model-From E/R Diagrams to Relational Designs - Design of Relational Database Schemas - Multi valued Dependencies. Relational Algebra: Relational OperationsExtended Operators of Relational Algebra- Constraints on Relations - Normalization - Normal Forms UNIT-III Simple Queries in SQL-Sub queries-Full-Relation Operations-Database Modifications-Defining a Relation Schema-View Definitions- Constraints and Triggers: Keys and Foreign KeysConstraints on Attributes and Tuples Modification of Constraints-Schema-Level Constraints and Triggers -Java Database Connectivity- Stored Procedures UNIT-IV The memory hierarchy -RAID-Index Structures: Indexes on Sequential Files-Secondary IndexesB-Trees-Hash Tables-. QUERY EVALUATION: Operator Evaluation , Query Optimization Estimating the Cost of Operations-Cost-Based Plan Selection -Order for Joins-Physical-Query Plan UNIT-V ACID- Transactions and Schedules, CONCURRENCY CONTROL: Serial and Serializable Schedules-ConflictSerializability-Enforcing Serializability by Locks-Locking Systems with Several Lock Modes-Concurrency Control by Timestamps, validation. TRANSACTION MANAGEMENT: Serializability and Recoverability-View Serializability-Resolving DeadlocksDistributed Databases: Commit and Lock Text Book 1. Raghu, R., Gehrke, J. and Ramakrishnan, R. (2002) Database management systems. 3rd edn. Boston, MA, United States: McGraw Hill Higher Education. Reference Books 1. 2. 3. Elmasri, R. and Navathe, S.B. (2008) Fundamentals of database systems.5th edn. India: Pearson Education India. Garcia-Molina, H., Ullman, J.D. and Widom, J. (2008) Database systems: The complete book. 2nd edn. United States: Pearson Prentice Hall. Silberschatz, A., Korth, H.F. and Sudarshan, S. (2001) Database systems concepts: With oracle CD. 4th edn.Boston, MA: McGraw-Hill Inc. Learning Outcomes Upon successful completion of the course the student will be able to: Identify and differentiate various relational databases Design a database model through ER models Construct and normalize conceptual data models Use database query language, i.e., SQL. using Oracle, My SQL Analyze the issues related to database performance,transaction Management and crash recovery Course Code Course Title Number of Credits Prerequisites Course Type : : : : : CSOE406 ADVANCED JAVA 4 CSPC209 OE Learning Objectives To develop error-free, well-documented Java programs; test Java servlets while developing Java programs which incorporate advanced graphic functions. To learn how to write, test, and debug advanced-level Object-Oriented programs using Java. Course Content UNIT-I Basics of Networking, TCP/IP sockets, Datagrams, URL, URL connection, String handling, java.util, java.io and java.net packages. UNIT-II Introduction, Relational Databases, Relational Database Overview: The Books Database, SQL, Installing MySQL and setting up a MySQL user Account, Creating Database books in MySQL, Manipulating Databases with JDBC, RowSet Interface, Java DB/Apache Derby, PreparedStatements, Stored Procedures, Transaction Processing. UNIT-III Providing an Overview of RMI, Developing Applications with RMI : Declaring Remote Interfaces, Implementing Remote Interfaces, Stubs and Skeletons, Registering remote objects. Writing RMI Clients, Setting up the Flight Server example, Pushing Data from the RMI Server, RMI over Inter-ORB Protocol ( IIOP). UNIT-IV Creating a Magazine Publisher Application Using Servlets, Using the Servlet Context, Performing URL Redirection, Examining the web.xml Deployment Descriptor. UNIT-V Introduction to the Apache Struts, MVC Architecture, Struts Architecture, How Struts Works?, Introduction to the Struts Controller, Introduction to the Struts Action Class, Using Struts Action From Class, Using Struts HTML Tags, Introduction to Struts Validator Framework, Client Side Address Validation in Struts, Custom Validators Example, Developing Application with Struts Tiles. Introduction to Hibernate 3.0, Hibernate Architecture, First Hibernate Application. Text Books 1. Deitel, P.J. and Deitel, H.M. (2006) Java: How to program. 7th edn. Harlow: Pearson Prentice Hall. 2. Schildt, H. (2014) Java the complete reference. 9th edn. New York, NY: McGraw-Hill Education Reference Books 1. Balagurusamy, E. (2007) Programming with java: A primer. 3rd edn. New Delhi: Tata McGraw-Hill 2. Eckel, B. (2006) Thinking in java: [the definitive introduction to object-oriented programming in the language of the world wide web ; for java.. 4th edn. United States: Prentice Hall PTR. 3. Sarang,P.G.,Adatia, R., Gabhart,K. and Arni,F. (2001) Professional EJB. 3rd Indian Reprint, Apress. 4. McGovern, J., Adatia, R., Fain, Y., Gordon, J., Henry, E. and Hurst, W. (2003) Java 2 . Indianapolis, IN: Hungry Minds Inc,U.S. 5. Bates, C. (2006) Web programming: Building Internet applications. 3rd edn. Chichester, United Kingdom: Wiley, John & Sons Learning Outcomes Upon successful completion of the course the students will be able to: Develop client/server applications and TCP/IP socket programming Update and retrieve the data from the databases using SQL Develop distributed applications using RMI Develop component-based Java software using JavaBeans Develop server side programs in the form of servlets Develop application using struts Develop application using Hibernate Course Code Course Title Number of Credits Prerequisites Course Type : : : : CSOE407 MOBILE APPLICATION DEVELOPMENT 4 Nil OE Learning Objectives To design and develop mobile applications To gain a basic understanding of computer architecture and object-oriented programming To independently produce fully functional app prototypes To understand mobile design principles Course Content UNIT-I Introduction to Android: Native Android Application; SDK Features; Introduction to Open Handset Alliance; Development Framework; Application Fundamentals; Device Compatibility; System permissions. UNIT –II User Interface and Application Components: Basic UI Design; Fragments; Widget Toolbox; Creating New View; Introduction to Intents; Intent Filters and broadcast Receivers; Activities; Services; Content Providers; Application Widgets; Processes and Threads. UNIT –III Files and Database Handling: Saving Application Data; Shared Preferences; Preference Framework and Activity; Static File as Resource; File System; Introduction to SQLite Database; Querying SQLite; Storage options; Data backup UNIT – IV User Experience Enhancement: Action Bar; Menus and Action Bar Items; Settings; Dialogs; Customizing Toast; Notifications; Search; Drag and Drop UNIT-V Multimedia, Wireless Connectivity and Telephony: Audio and Video Handling; Manipulating Raw Audio; Sound Effects; Camera Programming; Video Recording; Managing Wireless Connectivity : WiFi, Bluetooth, Near Field Communication; Hardware Support for Telephony; Telephony Management; SMS and MMS Text Books 1. Meier, R. (2012) Professional Android 4 application development. 4th edn. Indianapolis: John Wiley. 2. Pamungkas, Z.S. (2015) Phonegap 4 mobile application development cookbook. United Kingdom: Packt Publishing. References 1. Kosmaczewski, A. (2012) Mobile JavaScript application development: Bringing web programming to mobile devices. Sudbury, MA, United States: O’Reilly Media, Inc, USA. Learning Outcomes Upon successful completion of the course the student will be able to: Explain mobile devices, including their capabilities and limitations Describe the components and structure of a mobile development framework Use current mobile platforms and their architectures Differentiate various mobile application models/architectures and patterns Analyze the challenges in providing an effective user interface in mobile programming environment Develop mobile application for small devices Course Code Course Title Number of Credits Prerequisites Course Type : : : : : CSOE408 NETWORK ADMINISTRATION 3 Nil OE Learning Objectives To introduce computer network, different types of terminologies used in the internet To know the various trouble shooting methodologies of hardware and software To design a small network and to understand the routing of packets in the network. Course Content UNIT-I Introduction to Computer Networking, The TCP/IP and OSI Networking Models, TCP/IP Networking Model, History Leading to TCP/IP , Overview of the TCP/IP Networking Model , TCP/IP Application Layer , HTTP Overview , TCP/IP Transport Layer , TCP Error Recovery Basics , Same Layer and Adjacent Layer Interactions , TCP/IP Internet Layer , Internet Protocol and the Postal Service , Internet Protocol Addressing Basics , IP Routing Basics , TCP/IP Network Access Layer , TCP/IP Model and Terminology , Comparing the Two TCP/IP Models , Data Encapsulation Terminology, Names of TCP/IP Messages, OSI Networking Model , Comparing OSI and TCP/IP , Describing Protocols by Referencing the OSI Layers , OSI Layers and Their Functions , OSI Layering Concepts and Benefits , OSI Encapsulation Terminology. UNIT- II A Brief History of Ethernet , Ethernet UTP Cabling, Improving Performance by Using Switches Instead of Hubs, Ethernet Data-Link Protocols. Fundamentals of WANs: OSI Layer 1 for Pointto-Point WANs, OSI Layer 2 for Point-to-Point WANs, Frame Relay and Packet-Switching Services. Fundamentals of IPv4 Addressing and Routing: Overview of Network Layer Functions, IP Addressing, IP Routing, IP Routing Protocols, Network Layer Utilities. Fundamentals of TCP/IP Transport, Applications, and Security: TCP/IP Layer 4 Protocols: TCP and UDP, TCP/IP Applications, Network Security UNIT-III LAN Switching: LAN Switching Concepts, LAN Design Considerations. Operating Cisco LAN Switches, Ethernet Switch Configuration, Ethernet Switch Troubleshooting, Wireless LANs: Wireless LAN Concepts, Deploying WLANs, Wireless LAN Security. UNIT- IV Introduction to Subnetting, Analyze Subnetting and Addressing Needs, Make Design Choices, Analyzing Classful IPv4 Networks: Classful Network Concepts, Practice with Classful Networks, Converting Subnet Masks: Subnet Mask Conversion, Practice Converting Subnet Masks, Analyzing Existing Subnet Masks UNIT-V Installing Cisco Routers, Cisco Router IOS CLI, Upgrading Cisco IOS Software and the Cisco IOS Software Boot Process, Routing Protocol Concepts and Configuration: Connected and Static Routes, Routing Protocol Overview, Configuring and Verifying RIP-2, Troubleshooting IP Routing: IP Troubleshooting Tips and Tools, A Routing Troubleshooting Scenario Text Books 1. Odom, W. and Knott, T. (2006) Networking basics CCNA 1 companion guide (Cisco networking academy). Indianapolis: Cisco Press. 2. Lammle, T. (2008) CCENT Cisco certified entry networking technician study guide: ICND1 (exam 640-822). Indianapolis: Wiley, John & Sons. Reference Books 1. Odom, W. (2008). CCENT/CCNA ICND1 Official Exam Certification Guide, 3rd Edn. Cisco Press, ISBN: 1587204258. Learning Outcomes Upon successful completion of the course the student will be able to: Design a simple LAN network. Describe the devices required to build a LAN. Build small networks and can troubleshoot. Design the routing and switching of network. Course Code Course Title Number of Credits Prerequisites Course Type : : : : : CSOE409 DATA ANALYTICS USING PYTHON 4 Nil OE Learning Objectives To introduce Python- an open-source dynamic object-oriented scripting language To explore variables, arrays, lists, tuples, dictionaries, functions, methods, classes, objects To enable the students in writing server-side Python scripts To introduce SQL database, and advanced topics such as Model-View-Controller architecture and Web application development with the Django framework Course Content UNIT-I Introduction : History of Python , Dynamic Web Applications , Python Installation, Web Servers and Server-Side Programming , Python and Databases , UNIX/Linux Environment UNIT-II Data and Operations : Data Types , Variables and Constants, Operators, Expressions , Operator Precedence , Scope. Conditional Statements and Control Structures, If Else, Elif Clause, While, For ,Parallel Iteration, Numbered Iteration UNIT-III Functions: Function Definition , Blocks, Calling Function ,Function Parameters, Function Return Values, Lambda Expressions , Modules , Recursion , Exception Handling , Collections, Sequences, Lists, Strings Tuples, Mappings (Dictionaries) , Array Module. Modules: Module use, Creating modules ,Exploring available Python modules, The standard library ,Events and event driven programming using a predefined module UNIT-IV Object-Oriented Python : Defining a Class , Constructors, Encapsulation, Inheritance, Interfaces , Iterators , Generators , Polymorphism , Introspection, Static and Class Methods , Magic Methods , Web Interaction and File Access a. Python HTML Code Generation , CGI Code Generation , Templating Systems UNIT-V Form Input , Validation and Regular Expressions, Cookie Module , Reading/Writing Files , File Iterators , SQL and the MySQL Database , Introduction to SQL Syntax , Designing and Creating a Table in MySQL ,. MySQL Data Types, MySQLdb Module , Dynamic Python Applications with Django and MySQL a. Model-View-Controller Architecture b. Connecting to MySQL c. Object-Relational Mapping d. Authentication e. Testing and Debugging Text Book 1. Lutz, M. (2013) Learning python. 5th edn. United States: O’Reilly Media, Inc. Reference Books 1. Downey, A., Elkner, J. and Meyers, C. (2002) How to think like a computer scientist: Learning with python. United States: Green Tea Press. Learning Outcomes Upon successful completion of the course the student will be able to: Develop server-side Python scripts for publishing on Web Employ control structures, functions, and arrays to create Python programs Employ Python sequences and mappings to store and manipulate data Use SQL commands and the MySQL database together with Python Create an advanced project using MySQL, Python and a Model-View-Controller framework Course Code Course Title Number of Credits Prerequisites Course Type : : : : : CSOE410 BIG DATA AND ANALYTICS 3 Nil OE Learning Objectives To provide both basic and advanced methods of big data technology and tools, including Map Reduce Hive Hadoop and No-SQL Course Content UNIT- I INTRODUCTION TO BIG DATA :Introduction – distributed file system – Big Data and its importance, Four Vs, Drivers for Big data, Big data analytics, Big data applications. Algorithms using map reduce, Matrix-Vector Multiplication by Map Reduce. BIG DATA TECHNOLOGIES: Introduction to Map Reduce/Hadoop, Data analytics using Map Reduce/Hadoop, Data visualization techniques, Spark. UNIT- II INTRODUCTION HADOOP :Big Data – Apache Hadoop & Hadoop Ecosystem – Moving Data in and out of Hadoop – Understanding inputs and outputs of Map Reduce - Data Serialization. HADOOP ARCHITECTURE : Hadoop Architecture, Hadoop Storage: HDFS, Common Hadoop Shell commands , Anatomy of File Write and Read., NameNode, Secondary NameNode, and DataNode, HadoopMapReduce paradigm, Map and Reduce tasks, Job, Task trackers - Cluster Setup – SSH & Hadoop Configuration – HDFS Administering –Monitoring & Maintenance. UNIT- III HADOOP ECOSYSTEM AND YARN: Hadoop ecosystem components - Schedulers - Fair and Capacity, Hadoop 2.0 New Features- NameNode High Availability, HDFS Federation, MRv2, YARN, Running MRv1 in YARN. HIVE AND HIVEQL, HBASE Hive Architecture and Installation, Comparison with Traditional Database, HiveQL - Querying Data - Sorting And Aggregating, Map Reduce Scripts, Joins &Subqueries, HBase concepts- Advanced Usage, Schema Design, Advance Indexing - PIG, Zookeeper - how it helps in monitoring a cluster, HBase uses Zookeeper and how to Build Applications with Zookeeper. UNIT- IV NoSQL What is it?, Where It is Used Types of NoSQL databases, Why NoSQL?, Advantages of NoSQL, Use of NoSQL in Industry, SQL vs NoSQL, NewSQL UNIT –V SPARK: Introduction to Data Analysis with Spark, Downloading Spark and Getting Started, Programming with RDDs, Machine Learning with MLlib. Case studies. Text Books 1. Acharya, S. and Chellappan, S. Big data and Analytics. India: Wiley , John & Sons. 2. Minelli, M., Smith, D., Dhiraj, A., Chambers, M. and Rajaram, D. (2013) Big data, big Analytics: Emerging business intelligence and analytic trends for today’s businesses. United States: Wiley, John & Sons. 3. Lublinsky, B., Smith, K.T. and Yakubovich, A. (2013) Professional Hadoop solutions. United States: Wrox Press. Reference Books 1. Prajapati,V. (2013). Big Data Analytics with R and Hadoop. Packet Publishing. 2. White, T. (2012) Hadoop: The definitive guide. 3rd edn. United States: O’Reilly Media, Inc. 3. Eaton,Ch. and Deroos,D. (2012). Understanding Big data , McGraw Hill. 4. White, T. (2015) Hadoop: The definitive guide. United States: O’Reilly Media, Inc. Learning Outcomes Upon successful completion of the course the student will be able to: • • • Categorize and summarize Big Data and its importance. Differentiate various Big data technologies like Hadoop Map Reduce, Hive, Hbase and No-SQL. Apply tools and techniques to analyze Big Data. Course Code : Course Title Number of Credits Prerequisites Course Type : : : CSOE411 SOFTWARE ASPECTS OF INTERNET OF THINGS 3 Nil OE Learning Objectives To introduce concepts of Internet of Things To explore View, Information View, Deployment and Operational View and other relevant architectural views To expose Industrial Automation and Commercial Building Automation Course Content UNIT-I M2M to IoT-The Vision-Introduction, From M2M to IoT, M2M towards IoT-the global context, A use case example, Differing Characteristics. UNIT-II M2M to IoT – A Market Perspective– Introduction, Some Definitions, M2M Value Chains, IoT Value Chains, An emerging industrial structure for IoT, The international driven global value chain and global information monopolies. M2M to IoT-An Architectural Overview– Building an architecture, Main design principles and needed capabilities, An IoT architecture outline, standards considerations. UNIT-III M2M and IoT Technology Fundamentals- Devices and gateways, Local and wide area networking, Data management, Business processes in IoT, Everything as a Service(XaaS), M2M and IoT Analytics, Knowledge Management UNIT-IV IoT Architecture-State of the Art – Introduction, State of the art, Architecture Reference ModelIntroduction, Reference Model and architecture, IoT reference Model UNIT-V IoT Reference Architecture- Introduction, Functional View, Information View, Deployment and Operational View, Other Relevant architectural views. Real-World Design ConstraintsIntroduction, Technical Design constraints-hardware is popular again, Data representation and visualization, Interaction and remote control. Industrial Automation- Service-oriented architecture-based device integration, SOCRADES: realizing the enterprise integrated Web of Things, IMC-AESOP: from the Web of Things to the Cloud of Things, Commercial Building Automation- Introduction, Case study: phase one-commercial building automation today, Case study: phase two- commercial building automation in the future. Textbook 1. Höller, J., Holler, J., Tsiatsis, V. and Mulligan, C. (2014) From machine-to-machine to the Internet of things: Introduction to a new age of intelligence. Burlington: Elsevier Academic Press. Reference Books Bahga, A. and Madisetti, V. (2014) Internet of things: A hands-on approach. United States: Vpt. 2. Francis, Henderson, B. and DaCosta, F. (2014) Rethinking the Internet of things: A scalable approach to connecting everything. Berkeley, CA: Apress. 1. Learning Outcomes: Upon successful completion of the course the student will be able to: Understand the vision of IoT from a global context. Determine the Market perspective of IoT. Know the uses of Devices, Gateways and Data Management in IoT. Know state of the art architecture in IoT. Understand the working of application of IoT in Industrial and Commercial Building Automation and Real World Design Constraints