Download Course Code : CSOE401 Course Title : SOFTWARE ENGINEERING

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Database wikipedia , lookup

Relational model wikipedia , lookup

Functional Database Model wikipedia , lookup

Clusterpoint wikipedia , lookup

Database model wikipedia , lookup

Transcript
Course Code
Course Title
Number of Credits
Prerequisites
(Course code)
Course Type
: CSOE401
: SOFTWARE ENGINEERING
: 3
: Nil
: OE
Learning Objectives





To understand software process models such as waterfall and evolutionary models
To learn about software requirements specification document
To understand different software architectural styles
To understand software testing approaches like unit testing, integration testing etc.
To introduce various software quality control activities
Course Content
UNIT- I
Introduction to Software Engineering: The evolving role of software, Changing Nature of
Software, Software myths. A Generic view of process: Software engineering- A layered
technology, a process framework, The Capability Maturity Model Integration (CMMI), Process
patterns, process assessment, personal and team process models. Process models: The waterfall
model, Incremental process models, Evolutionary process models, The Unified process.
UNIT-II
Software Requirements: Functional and non-functional requirements, User requirements,
System requirements, Interface specification, the software requirements document. Requirements
engineering process: Feasibility studies, Requirements elicitation and analysis, Requirements
validation, Requirements management. System models : Context Models, Behavioural models,
Data models, Object models, structured methods.
UNIT - III
Design Engineering: Design process and Design quality, Design concepts, the design
model. Creating an architectural design: Software architecture, Data design, Architectural styles
and patterns, Architectural Design. Object-Oriented Design: Objects and object classes, An
Object-Oriented design process, Design evolution. Performing User interface design: Golden
rules, User interface analysis and design, interface analysis, interface design steps, Design
evaluation.
UNIT- IV
Testing Strategies: A strategic approach to software testing, test strategies for conventional
software, Black-Box and White-Box testing, Validation testing, System testing, the art of
Debugging. Product metrics: Software Quality, Metrics for Analysis Model, Metrics for Design
Model, Metrics for source code, Metrics for testing, Metrics for maintenance. Metrics for
Process and Products : Software Measurement, Metrics for software quality. Risk
management: Reactive vs. Proactive Risk strategies, software risks, Risk identification,
Risk projection, Risk refinement, RMMM, RMMM Plan.
UNIT-V
Quality Management: Quality concepts, Software quality assurance, Software Reviews,
Formal technical reviews, Statistical Software quality Assurance, Software reliability, The ISO
9000 quality standards.
Text Books
1. Pressman, R.S. and Pressman (2004) Software engineering: A practitioner’s approach.
6th edn. Boston, MA: McGraw Hill Higher Education.
2. Sommerville, I. (2006) Software engineering. 7th edn. Harlow, England: AddisonWesley Educational Publishers.
Reference Books
1. Jalote, P. (2010) Software engineering: A precise approach. Daryaganj, New Delhi:
Wiley India.
2. Jawadekar,W.S.(2008)."Software Engineering: A Primer",New Delhi: Tata McGrawHill.
3. Mall, R. (2014) Fundamentals of software engineering. India: Prentice-Hall of India.
Learning Outcomes:
Upon successful completion of the course the student will be able to:
•
•
•
•
•
Identify the software requirements using various requirements gathering techniques
Design and develop SRS document
Choose the suitable process model for a software application
Develop, maintain, efficient, reliable and cost effective software solutions
Measure the software developed
Course Code
Course Title
Number of
Credits
Prerequisites
Course Type
:
:
CSOE402
NETWORK SECURITY
:
:
:
3
CSPC305
OE
Learning Objectives






To learn the technologies , methodologies and protocols to secure computer networks
To introduce various cryptographic algorithms
To provide the basics of public key encryption and number theory
To know authentication, Hash functions and Digital signatures
To know the network security tools and applications
To understand the System security, Transport layer security, IP security, Wireless
LAN security and Application level security
Course Content
UNIT- I
OSI Security Architecture
Security Attacks, Security Services, Security Mechanisms and A
model for Network Security. Classical Encryption Techniques
Symmetric Cipher Model,
Substitution Techniques, Transposition techniques and Steganography
UNIT- II
Data Encryption Standards Block Cipher principles, DES algorithm and Examples, Strength of
DES, Block Cipher design Principles .Block Cipher Operations
Modes
of
operations,
ECB,CBC,CF,OF and Counter Mode, Multiple Encryption and Triple DES. Advanced
Encryption Standards AES Structure ( Encryption and Decryption), AES Transformation
Functions Introduction to number Theory .Prime Numbers, Fermat’s and Euler’s Theorem
UNIT- III
Public-Key Cryptography Principles of Public-Key Cryptosystems, RSA Algorithm. Other
Public-Key Cryptosystems Diffie-Hellman Key Exchange, ElGamal Cryptographic system,
Elliptic Curve Cryptography, ElGamal Cryptographic Hash Functions
Authentication,
Message Authentication Functions, Message Authentication Requirements, Applications of
Cryptographic Hash Functions, Two Simple Hash Functions, MD5 and SHA-1 algorithms,
MACs based on Hash functions(HMAC).
UNIT- IV
Digital Signatures
Properties, Attacks and Forgeries, Digital Signature requirements, Direct
Digital Signature, DSA algorithm . Key Management and Distribution
Symmetric
Key
Distribution Using Symmetric Encryption, Symmetric Key Distribution Using Asymmetric
Encryption, Distribution ofPublic keys, X.509 Certificate format, Forward Certificate and
reverse Certificate. User Authentication
Remote user Authentication Principles, Remote
user-Authentication using Symmetric and AsymmetricEncryption, Kerberos Authentication
protocol
UNIT- V
Transport Level Security ,Web Security, SSL Architecture, Secure Shell(SSH), SET. Wireless
LAN Security and E-mail Security IEEE 802.11i Wireless LAN Security, Wireless Transport
layer Security, PGP, S/MIME. IP Security IP Security Overview, IP Security Policy,
Encapsulating Security Payload, Combining Security Associations. System Security Intruders,
IDS, Password Management, Malicious Software, Firewalls, Firewall characteristics, Types of
firewalls, Firewall Basing
Text Book
1. Stallings, W. (2011) Cryptography and network security: Principles and practice. 5th
edn. Boston: Prentice Hall.
Reference Books
2. Stallings, W. (2013) Network security essentials: Applications and standards. 4th edn.
Boston: Prentice Hall.
3. Kahate, A. (2003) Cryptography and network security. New Delhi: Tata McGraw-Hill
Pub.
4. Mao, W. (2003) Modern Cryptography: Theory and practice (paperback). 8th edn.
United States: Pearson Education.
Learning Outcomes
Upon successful completion of the course the student will be able to:






Identify Vulnerabilities ,different types of threats and Risk
Write code for relevant cryptographic algorithms and Digest algorithms
Know security tools like Crypt , Wireshark and Cain
Send and receive secure mails
Understand SET,SSL & S/MIME protocols
Determine firewall requirements, and configure a firewall
Course Code
Course Title
Number of Credits
Prerequisites
Course Type
:
:
:
:
:
CSOE403
ARTIFICIAL INTELLIGENCE
3
Nil
OE
Learning Objectives:

To provide an understanding of abstractions and reasoning techniques used in AI.

To introduce intelligent agents

To enhance students skills like Problem solving, Knowledge and Reasoning, Planning,
Uncertainty and Learning.
Course Content
UNIT-I
What is AI?, Agents and Environments, Good Behavior: The Concept of Rationality, The
Nature of Environments, The Structure of Agents, Problem-Solving Agents, Example Problems,
Searching for Solutions.
UNIT-II
Uninformed Search strategies, Avoiding Repeated States, Searching with Partial Information,
Informed (Heuristic) Search Strategies, Heuristic Functions, Local Search Algorithms and
Optimization Problems, Constraint Satisfaction Problems, Backtracking Search for CSPs, Local
Search for Constraint Satisfaction Problems, The Structure of Problems.
UNIT-III
First Order Logic: Representation, Syntax and Semantics of First-order logic, Using First-order
logic, Knowledge Engineering in First-Order Logic, Propositional Vs. First-Order Inference,
Unification and Lifting, Forward Chaining, Backward Chaining, Resolution, Ontological
Engineering, Categories and Objects, Actions, Situations and Events.
UNIT-IV
The Planning Problem, Planning with State-Space Search, Partial-Order Planning, Planning
Graphs, Planning with propositional logic, Analysis of Planning Approaches, Acting under
Uncertainty, Basic Probability Notation, The Axioms of Probability, Inference using Full Joint
Distributions, Independence, and Baye’s Rule and its Use.
UNIT-V
Forms of Learning, Inductive Learning, Neural Networks, Kernel Machines
Text Book
1. Russell, S.J., Norvig, P. and Davis, E. (2003) Artificial intelligence: A modern approach.
2nd edn. Boston: Prentice Hall.
Reference Book
1. Rich, E. and Knight, K. (1991) Artificial intelligence. 2nd edn. New York: McGraw-Hill
Publishing.
Learning Outcomes
Upon successful completion of the course the student will be able to:

Represent any problem as a state space search

Solve problems using uninformed and informed search techniques

Specify the Time & Space Complexity of Algorithms like BFS, DFS, IDFS

Solve constraint satisfaction problems like map coloring

Represent knowledge as first-order logic, Propositional logic

Solve problems using planning algorithms like GRAPHPLAN
Course Code
Course Title
Number of Credits
Prerequisites
Course Type
:
:
:
:
:
CSOE404
DATA WAREHOUSING AND DATA MINING
3
CSPC207
OE
Learning objectives



To provide concepts of Data Warehousing and Data Mining.
To learn the architecture of Data Mining system and Data warehouse.
To introduce various data mining methods like Data preprocessing, Classification and
Prediction.
Course Content
UNIT- I
Data Warehousing and Business Analysis - Data warehousing Components, Building a Data
warehouse, Data Warehouse Architecture, DBMS Schemas for Decision Support, Data
Extraction, Cleanup, and Transformation Tools, Metadata, Query tools and Applications, Online
Analytical Processing (OLAP), OLAP and Multidimensional Data Analysis.
UNIT- II
Data Mining: - Data Mining Functionalities, Data Preprocessing, Data Cleaning, Data Integration
and Transformation, Data Reduction, Data Discretization and Concept Hierarchy Generation,
Architecture Of A Typical Data Mining Systems, Classification Of Data Mining Systems.
Association Rule Mining- Efficient and Scalable Frequent Item set Mining Methods, Mining
Various Kinds of Association Rules, Association Mining to Correlation Analysis, ConstraintBased Association Mining.
UNIT- III
Classification and Prediction - Issues Regarding Classification and Prediction, Classification by
Decision Tree Introduction, Bayesian Classification, Rule Based Classification, Classification
by Back propagation, Support Vector Machines, Associative Classification, Lazy Learners,
Other Classification Methods, Prediction, Accuracy and Error Measures, Evaluating the
Accuracy of a Classifier or Predictor, Ensemble Methods, Model Section.
UNIT- IV
Cluster Analysis -Types of Data in Cluster Analysis, A Categorization of Major Clustering
Methods, Partitioning Methods, Hierarchical methods, Density-Based Methods, Grid-Based
Methods, Model-Based Clustering Methods, Clustering High-Dimensional Data, ConstraintBased Cluster Analysis ,Outlier Analysis.
UNIT- V
Mining Object, Spatial, Multimedia, Text and Web Data-Multidimensional Analysis and
Descriptive Mining of Complex Data Objects, Spatial Data Mining, Multimedia Data Mining,
Text Mining, Mining the World Wide Web.
Text Book
1. Han, J., Kamber, M. and Pei, J. (2011) Data mining: Concepts and techniques. 3rd edn.
New Delhi, India: Elsevier.
Reference Books
1. Berson, A. and Smith, S.J. (1997) Data warehousing, data mining, and OLAP. New
York: McGraw-Hill Inc.
2. Soman, K.P., Diwakar, S. and Ajay, V. (2006) Insight into data mining: Theory and
practice. New Delhi: Prentice-Hall.
3. Gupta, G.K. (2011) Introduction to data mining with case studies. 2nd edn. New Delhi,
India: Prentice-Hall.
Learning Outcomes
Upon successful completion of the course the student will be able to:



Differentiate OLAP and OLTP
Apply various DM techniques
Use various tools used in data mining
Course Code
Course Title
No of Credits
Prerequisites
Course Type
:
:
:
:
:
CSOE405
DATABASE MANAGEMENT SYSTEMS
4
Nil
OE
Learning Objectives




To learn relation database models
To explore conceptual and relational database designs like ER diagrams, relational
algebra.
To write SQL commands in any of the RDBMS
To learn about Query Processing and Transaction Processing
Course Content
UNIT-I
Overview of Database Systems- Overview of a Database Management System-Database design
and ER diagramsl: Elements of the E/R Model-Design Principles-The Modeling of ConstraintsWeak Entity Sets
UNIT- II
Basics of the Relational Model-From E/R Diagrams to Relational Designs - Design of Relational
Database Schemas - Multi valued Dependencies. Relational Algebra: Relational OperationsExtended Operators of Relational Algebra- Constraints on Relations - Normalization - Normal
Forms
UNIT-III
Simple Queries in SQL-Sub queries-Full-Relation Operations-Database Modifications-Defining
a Relation Schema-View Definitions- Constraints and Triggers: Keys and Foreign KeysConstraints on Attributes and Tuples Modification of Constraints-Schema-Level Constraints and
Triggers -Java Database Connectivity- Stored Procedures
UNIT-IV
The memory hierarchy -RAID-Index Structures: Indexes on Sequential Files-Secondary IndexesB-Trees-Hash Tables-. QUERY EVALUATION: Operator Evaluation , Query Optimization
Estimating the Cost of Operations-Cost-Based Plan Selection -Order for Joins-Physical-Query
Plan
UNIT-V
ACID- Transactions and Schedules, CONCURRENCY CONTROL: Serial and Serializable
Schedules-ConflictSerializability-Enforcing Serializability by Locks-Locking Systems with
Several Lock Modes-Concurrency Control by Timestamps, validation. TRANSACTION
MANAGEMENT: Serializability and Recoverability-View Serializability-Resolving DeadlocksDistributed Databases: Commit and Lock
Text Book
1.
Raghu, R., Gehrke, J. and Ramakrishnan, R. (2002) Database management systems. 3rd
edn. Boston, MA, United States: McGraw Hill Higher Education.
Reference Books
1.
2.
3.
Elmasri, R. and Navathe, S.B. (2008) Fundamentals of database systems.5th edn. India:
Pearson Education India.
Garcia-Molina, H., Ullman, J.D. and Widom, J. (2008) Database systems: The
complete book. 2nd edn. United States: Pearson Prentice Hall.
Silberschatz, A., Korth, H.F. and Sudarshan, S. (2001) Database systems concepts:
With oracle CD. 4th edn.Boston, MA: McGraw-Hill Inc.
Learning Outcomes
Upon successful completion of the course the student will be able to:





Identify and differentiate various relational databases
Design a database model through ER models
Construct and normalize conceptual data models
Use database query language, i.e., SQL. using Oracle, My SQL
Analyze the issues related to database performance,transaction Management and crash
recovery
Course Code
Course Title
Number of Credits
Prerequisites
Course Type
:
:
:
:
:
CSOE406
ADVANCED JAVA
4
CSPC209
OE
Learning Objectives

To develop error-free, well-documented Java programs; test Java servlets while
developing Java programs which incorporate advanced graphic functions.

To learn how to write, test, and debug advanced-level Object-Oriented programs using
Java.
Course Content
UNIT-I
Basics of Networking, TCP/IP sockets, Datagrams, URL, URL connection, String handling,
java.util, java.io and java.net packages.
UNIT-II
Introduction, Relational Databases, Relational Database Overview: The Books Database, SQL,
Installing MySQL and setting up a MySQL user Account, Creating Database books in MySQL,
Manipulating Databases with JDBC, RowSet Interface, Java DB/Apache Derby,
PreparedStatements, Stored Procedures, Transaction Processing.
UNIT-III
Providing an Overview of RMI, Developing Applications with RMI : Declaring Remote
Interfaces, Implementing Remote Interfaces, Stubs and Skeletons, Registering remote objects.
Writing RMI Clients, Setting up the Flight Server example, Pushing Data from the RMI Server,
RMI over Inter-ORB Protocol ( IIOP).
UNIT-IV
Creating a Magazine Publisher Application Using Servlets, Using the Servlet Context,
Performing URL Redirection, Examining the web.xml Deployment Descriptor.
UNIT-V
Introduction to the Apache Struts, MVC Architecture, Struts Architecture, How Struts Works?,
Introduction to the Struts Controller, Introduction to the Struts Action Class, Using Struts Action
From Class, Using Struts HTML Tags, Introduction to Struts Validator Framework, Client Side
Address Validation in Struts, Custom Validators Example, Developing Application with Struts
Tiles. Introduction to Hibernate 3.0, Hibernate Architecture, First Hibernate Application.
Text Books
1. Deitel, P.J. and Deitel, H.M. (2006) Java: How to program. 7th edn. Harlow: Pearson
Prentice Hall.
2. Schildt, H. (2014) Java the complete reference. 9th edn. New York, NY: McGraw-Hill
Education
Reference Books
1. Balagurusamy, E. (2007) Programming with java: A primer. 3rd edn. New Delhi: Tata
McGraw-Hill
2. Eckel, B. (2006) Thinking in java: [the definitive introduction to object-oriented
programming in the language of the world wide web ; for java.. 4th edn. United States:
Prentice Hall PTR.
3. Sarang,P.G.,Adatia, R., Gabhart,K. and Arni,F. (2001) Professional EJB. 3rd Indian
Reprint, Apress.
4. McGovern, J., Adatia, R., Fain, Y., Gordon, J., Henry, E. and Hurst, W. (2003) Java 2 .
Indianapolis, IN: Hungry Minds Inc,U.S.
5. Bates, C. (2006) Web programming: Building Internet applications. 3rd edn. Chichester,
United Kingdom: Wiley, John & Sons
Learning Outcomes
Upon successful completion of the course the students will be able to:







Develop client/server applications and TCP/IP socket programming
Update and retrieve the data from the databases using SQL
Develop distributed applications using RMI
Develop component-based Java software using JavaBeans
Develop server side programs in the form of servlets
Develop application using struts
Develop application using Hibernate
Course Code
Course Title
Number of Credits
Prerequisites
Course Type
:
:
:
:
CSOE407
MOBILE APPLICATION DEVELOPMENT
4
Nil
OE
Learning Objectives




To design and develop mobile applications
To gain a basic understanding of computer architecture and object-oriented programming
To independently produce fully functional app prototypes
To understand mobile design principles
Course Content
UNIT-I
Introduction to Android: Native Android Application; SDK Features; Introduction to Open
Handset Alliance; Development Framework; Application Fundamentals; Device Compatibility;
System permissions.
UNIT –II
User Interface and Application Components: Basic UI Design; Fragments; Widget Toolbox;
Creating New View; Introduction to Intents; Intent Filters and broadcast Receivers; Activities;
Services; Content Providers; Application Widgets; Processes and Threads.
UNIT –III
Files and Database Handling: Saving Application Data; Shared Preferences; Preference
Framework and Activity; Static File as Resource; File System; Introduction to SQLite Database;
Querying SQLite; Storage options; Data backup
UNIT – IV
User Experience Enhancement: Action Bar; Menus and Action Bar Items; Settings; Dialogs;
Customizing Toast; Notifications; Search; Drag and Drop
UNIT-V
Multimedia, Wireless Connectivity and Telephony: Audio and Video Handling; Manipulating
Raw Audio; Sound Effects; Camera Programming; Video Recording; Managing Wireless
Connectivity : WiFi, Bluetooth, Near Field Communication; Hardware Support for Telephony;
Telephony Management; SMS and MMS
Text Books
1. Meier, R. (2012) Professional Android 4 application development. 4th edn. Indianapolis:
John Wiley.
2. Pamungkas, Z.S. (2015) Phonegap 4 mobile application development cookbook. United
Kingdom: Packt Publishing.
References
1. Kosmaczewski, A. (2012) Mobile JavaScript application development: Bringing web
programming to mobile devices. Sudbury, MA, United States: O’Reilly Media, Inc, USA.
Learning Outcomes
Upon successful completion of the course the student will be able to:

Explain mobile devices, including their capabilities and limitations

Describe the components and structure of a mobile development framework

Use current mobile platforms and their architectures

Differentiate various mobile application models/architectures and patterns

Analyze the challenges in providing an effective user interface in mobile programming
environment

Develop mobile application for small devices
Course Code
Course Title
Number of Credits
Prerequisites
Course Type
:
:
:
:
:
CSOE408
NETWORK ADMINISTRATION
3
Nil
OE
Learning Objectives

To introduce computer network, different types of terminologies used in the internet

To know the various trouble shooting methodologies of hardware and software

To design a small network and to understand the routing of packets in the network.
Course Content
UNIT-I
Introduction to Computer Networking, The TCP/IP and OSI Networking Models, TCP/IP
Networking Model, History Leading to TCP/IP , Overview of the TCP/IP Networking Model ,
TCP/IP Application Layer , HTTP Overview , TCP/IP Transport Layer , TCP Error Recovery
Basics , Same Layer and Adjacent Layer Interactions , TCP/IP Internet Layer , Internet Protocol
and the Postal Service , Internet Protocol Addressing Basics , IP Routing Basics , TCP/IP
Network Access Layer , TCP/IP Model and Terminology , Comparing the Two TCP/IP Models ,
Data Encapsulation Terminology, Names of TCP/IP Messages, OSI Networking Model ,
Comparing OSI and TCP/IP , Describing Protocols by Referencing the OSI Layers , OSI Layers
and Their Functions , OSI Layering Concepts and Benefits , OSI Encapsulation Terminology.
UNIT- II
A Brief History of Ethernet , Ethernet UTP Cabling, Improving Performance by Using Switches
Instead of Hubs, Ethernet Data-Link Protocols. Fundamentals of WANs: OSI Layer 1 for Pointto-Point WANs, OSI Layer 2 for Point-to-Point WANs, Frame Relay and Packet-Switching
Services. Fundamentals of IPv4 Addressing and Routing: Overview of Network Layer
Functions, IP Addressing, IP Routing, IP Routing Protocols, Network Layer Utilities.
Fundamentals of TCP/IP Transport, Applications, and Security: TCP/IP Layer 4 Protocols: TCP
and UDP, TCP/IP Applications, Network Security
UNIT-III
LAN Switching: LAN Switching Concepts, LAN Design Considerations. Operating Cisco LAN
Switches, Ethernet Switch Configuration, Ethernet Switch Troubleshooting, Wireless LANs:
Wireless LAN Concepts, Deploying WLANs, Wireless LAN Security.
UNIT- IV
Introduction to Subnetting, Analyze Subnetting and Addressing Needs, Make Design Choices,
Analyzing Classful IPv4 Networks: Classful Network Concepts, Practice with Classful
Networks, Converting Subnet Masks: Subnet Mask Conversion, Practice Converting Subnet
Masks, Analyzing Existing Subnet Masks
UNIT-V
Installing Cisco Routers, Cisco Router IOS CLI, Upgrading Cisco IOS Software and the Cisco
IOS Software Boot Process, Routing Protocol Concepts and Configuration: Connected and Static
Routes, Routing Protocol Overview, Configuring and Verifying RIP-2, Troubleshooting IP
Routing: IP Troubleshooting Tips and Tools, A Routing Troubleshooting Scenario
Text Books
1. Odom, W. and Knott, T. (2006) Networking basics CCNA 1 companion guide (Cisco
networking academy). Indianapolis: Cisco Press.
2. Lammle, T. (2008) CCENT Cisco certified entry networking technician study guide:
ICND1 (exam 640-822). Indianapolis: Wiley, John & Sons.
Reference Books
1. Odom, W. (2008). CCENT/CCNA ICND1 Official Exam Certification Guide, 3rd Edn.
Cisco Press, ISBN: 1587204258.
Learning Outcomes
Upon successful completion of the course the student will be able to:




Design a simple LAN network.
Describe the devices required to build a LAN.
Build small networks and can troubleshoot.
Design the routing and switching of network.
Course Code
Course Title
Number of Credits
Prerequisites
Course Type
:
:
:
:
:
CSOE409
DATA ANALYTICS USING PYTHON
4
Nil
OE
Learning Objectives




To introduce Python- an open-source dynamic object-oriented scripting language
To explore variables, arrays, lists, tuples, dictionaries, functions, methods, classes,
objects
To enable the students in writing server-side Python scripts
To introduce SQL database, and advanced topics such as Model-View-Controller
architecture and Web application development with the Django framework
Course Content
UNIT-I
Introduction : History of Python , Dynamic Web Applications , Python Installation, Web Servers
and Server-Side Programming , Python and Databases , UNIX/Linux Environment
UNIT-II
Data and Operations : Data Types , Variables and Constants, Operators, Expressions , Operator
Precedence , Scope. Conditional Statements and Control Structures, If Else, Elif Clause, While,
For ,Parallel Iteration, Numbered Iteration
UNIT-III
Functions: Function Definition , Blocks, Calling Function ,Function Parameters, Function
Return Values, Lambda Expressions , Modules , Recursion , Exception Handling , Collections,
Sequences, Lists, Strings Tuples, Mappings (Dictionaries) , Array Module. Modules: Module
use, Creating modules ,Exploring available Python modules, The standard library ,Events and
event driven programming using a predefined module
UNIT-IV
Object-Oriented Python : Defining a Class , Constructors, Encapsulation, Inheritance,
Interfaces , Iterators , Generators , Polymorphism , Introspection, Static and Class Methods ,
Magic Methods , Web Interaction and File Access a. Python HTML Code Generation , CGI
Code Generation , Templating Systems
UNIT-V
Form Input , Validation and Regular Expressions, Cookie Module , Reading/Writing Files , File
Iterators , SQL and the MySQL Database , Introduction to SQL Syntax , Designing and Creating
a Table in MySQL ,. MySQL Data Types, MySQLdb Module , Dynamic Python Applications
with Django and MySQL a. Model-View-Controller Architecture b. Connecting to MySQL c.
Object-Relational Mapping d. Authentication e. Testing and Debugging
Text Book
1. Lutz, M. (2013) Learning python. 5th edn. United States: O’Reilly Media, Inc.
Reference Books
1. Downey, A., Elkner, J. and Meyers, C. (2002) How to think like a computer scientist:
Learning with python. United States: Green Tea Press.
Learning Outcomes
Upon successful completion of the course the student will be able to:





Develop server-side Python scripts for publishing on Web
Employ control structures, functions, and arrays to create Python programs
Employ Python sequences and mappings to store and manipulate data
Use SQL commands and the MySQL database together with Python
Create an advanced project using MySQL, Python and a Model-View-Controller
framework
Course Code
Course Title
Number of Credits
Prerequisites
Course Type
:
:
:
:
:
CSOE410
BIG DATA AND ANALYTICS
3
Nil
OE
Learning Objectives

To provide both basic and advanced methods of big data technology and tools, including
Map Reduce Hive Hadoop and No-SQL
Course Content
UNIT- I
INTRODUCTION TO BIG DATA :Introduction – distributed file system – Big Data and its
importance, Four Vs, Drivers for Big data, Big data analytics, Big data applications. Algorithms
using map reduce, Matrix-Vector Multiplication by Map Reduce. BIG DATA
TECHNOLOGIES: Introduction to Map Reduce/Hadoop, Data analytics using Map
Reduce/Hadoop, Data visualization techniques, Spark.
UNIT- II
INTRODUCTION HADOOP :Big Data – Apache Hadoop & Hadoop Ecosystem – Moving Data
in and out of Hadoop – Understanding inputs and outputs of Map Reduce - Data Serialization.
HADOOP ARCHITECTURE : Hadoop Architecture, Hadoop Storage: HDFS, Common Hadoop
Shell commands , Anatomy of File Write and Read., NameNode, Secondary NameNode, and
DataNode, HadoopMapReduce paradigm, Map and Reduce tasks, Job, Task trackers - Cluster
Setup – SSH & Hadoop Configuration – HDFS Administering –Monitoring & Maintenance.
UNIT- III
HADOOP ECOSYSTEM AND YARN: Hadoop ecosystem components - Schedulers - Fair and
Capacity, Hadoop 2.0 New Features- NameNode High Availability, HDFS Federation, MRv2,
YARN, Running MRv1 in YARN. HIVE AND HIVEQL, HBASE Hive Architecture and
Installation, Comparison with Traditional Database, HiveQL - Querying Data - Sorting And
Aggregating, Map Reduce Scripts, Joins &Subqueries, HBase concepts- Advanced Usage,
Schema Design, Advance Indexing - PIG, Zookeeper - how it helps in monitoring a cluster,
HBase uses Zookeeper and how to Build Applications with Zookeeper.
UNIT- IV
NoSQL What is it?, Where It is Used Types of NoSQL databases, Why NoSQL?, Advantages of
NoSQL, Use of NoSQL in Industry, SQL vs NoSQL, NewSQL
UNIT –V
SPARK: Introduction to Data Analysis with Spark, Downloading Spark and Getting Started,
Programming with RDDs, Machine Learning with MLlib. Case studies.
Text Books
1. Acharya, S. and Chellappan, S. Big data and Analytics. India: Wiley , John & Sons.
2. Minelli, M., Smith, D., Dhiraj, A., Chambers, M. and Rajaram, D. (2013) Big data, big
Analytics: Emerging business intelligence and analytic trends for today’s businesses.
United States: Wiley, John & Sons.
3. Lublinsky, B., Smith, K.T. and Yakubovich, A. (2013) Professional Hadoop solutions.
United States: Wrox Press.
Reference Books
1. Prajapati,V. (2013). Big Data Analytics with R and Hadoop. Packet Publishing.
2. White, T. (2012) Hadoop: The definitive guide. 3rd edn. United States: O’Reilly Media, Inc.
3. Eaton,Ch. and Deroos,D. (2012). Understanding Big data , McGraw Hill.
4. White, T. (2015) Hadoop: The definitive guide. United States: O’Reilly Media, Inc.
Learning Outcomes
Upon successful completion of the course the student will be able to:
•
•
•
Categorize and summarize Big Data and its importance.
Differentiate various Big data technologies like Hadoop Map Reduce, Hive, Hbase and
No-SQL.
Apply tools and techniques to analyze Big Data.
Course Code
:
Course Title
Number of Credits
Prerequisites
Course Type
:
:
:
CSOE411
SOFTWARE ASPECTS OF INTERNET OF
THINGS
3
Nil
OE
Learning Objectives



To introduce concepts of Internet of Things
To explore View, Information View, Deployment and Operational View and other
relevant architectural views
To expose Industrial Automation and Commercial Building Automation
Course Content
UNIT-I
M2M to IoT-The Vision-Introduction, From M2M to IoT, M2M towards IoT-the global context,
A use case example, Differing Characteristics.
UNIT-II
M2M to IoT – A Market Perspective– Introduction, Some Definitions, M2M Value Chains, IoT
Value Chains, An emerging industrial structure for IoT, The international driven global value
chain and global information monopolies. M2M to IoT-An Architectural Overview– Building an
architecture, Main design principles and needed capabilities, An IoT architecture outline,
standards considerations.
UNIT-III
M2M and IoT Technology Fundamentals- Devices and gateways, Local and wide area
networking, Data management, Business processes in IoT, Everything as a Service(XaaS), M2M
and IoT Analytics, Knowledge Management
UNIT-IV
IoT Architecture-State of the Art – Introduction, State of the art, Architecture Reference ModelIntroduction, Reference Model and architecture, IoT reference Model
UNIT-V
IoT Reference Architecture- Introduction, Functional View, Information View, Deployment and
Operational View, Other Relevant architectural views. Real-World Design ConstraintsIntroduction, Technical Design constraints-hardware is popular again, Data representation and
visualization, Interaction and remote control. Industrial Automation- Service-oriented
architecture-based device integration, SOCRADES: realizing the enterprise integrated Web of
Things, IMC-AESOP: from the Web of Things to the Cloud of Things, Commercial Building
Automation- Introduction, Case study: phase one-commercial building automation today, Case
study: phase two- commercial building automation in the future.
Textbook
1.
Höller, J., Holler, J., Tsiatsis, V. and Mulligan, C. (2014) From machine-to-machine to
the Internet of things: Introduction to a new age of intelligence. Burlington: Elsevier
Academic Press.
Reference Books
Bahga, A. and Madisetti, V. (2014) Internet of things: A hands-on approach. United
States: Vpt.
2. Francis, Henderson, B. and DaCosta, F. (2014) Rethinking the Internet of things: A
scalable approach to connecting everything. Berkeley, CA: Apress.
1.
Learning Outcomes:
Upon successful completion of the course the student will be able to:

Understand the vision of IoT from a global context.

Determine the Market perspective of IoT.

Know the uses of Devices, Gateways and Data Management in IoT.

Know state of the art architecture in IoT.
Understand the working of application of IoT in Industrial and Commercial Building
Automation and Real World Design Constraints
