Professional Documents
Culture Documents
Semester -VII
Branch: Computer Science & Engineering
)$ Code Course Title Lecture Tutorial Practical Credits
1 CSC701 Artificial Intelligence 3 0 0
2 PEC-III Professional Elective -III 3 0 0
3 PEC-IV Professional Elective -IV 3 0 0
4 OEC III Open Elective -III 3 0 0
5 OEC IV Open Elective -IV 3 0 0 3
6 CS701P Artificial Intelligence Lab. 0 0 2 1
7 CS702D Project-I 0 0 4 2
8 CS703I Internship Assessment II 0 0 2 2
Total credits 20
1. CS801D Project-II 16 08
Total Credit 08
NOTE- A Student can be allowed to do project outside after the permission of departmental Academic
Committee. Those students doing project outside has present their project progress every month. Those
students doing project outside can be permitted to present progress every fortnight though video
conferencing. Students doing project in house has present their project progress every week.
CSE / IT
Computer Science & Engineering and Information Technology
3 0 0 3
COURSE OUTCOME
CO-PO MAPPING:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 P10 P11 P12
CO.1 3 - - - - - - - - - - 3
CO.2 3 2 2 2 - - - - - - - -
CO.3 3 2 2 2 - - - - - - - -
CO.4 3 - - - - - - - - - - 2
CO.5 - 2 2 2 - - - - - - - -
*3: high, 2: moderate, 1 low
MODULE 1:
Introduction
Overview of AI, Problems of AI, AI techniques, Problem Solving, Problem Space and Search,
Defining the problem as state space search, Problem characteristics; Tic,Tac,Toe Problem
AI languages
Basic knowledge of AI programming languages like Prolog and Lisp .
MODULE 2:
MODULE 3:
MODULE 4:
MODULE 5:
Structured Knowledge
Associative networks, Conceptual graphs, Frames structures.
Expert Systems
Rule based systems, Non production systems : decision tree architectures, black board system
architecture, neural network architecture.
Learning
Types of learning, general learning model, Learning by induction; generalization, specialization,
example of inductive learner.
Text book:
1. Elaine Rich, Kevin Knight and Shivashankar B Nair, “Artificial Intelligence”, Mc Graw
Hill Publication, 2009.
2. Dan W. Patterson, “Introduction to Artificial Intelligence and Expert System”, Pearson
Publication,2015.
References:
CO-PO Mapping-
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 3 1 2
CO2 3 2 3 1 1 2
CO3 3 3 2 2 1
CO4 3 2 2 2
CO5 2 2 3 1 2
MODULE 1: What is Machine learning, Basic principal, Utility of ML Well defined learning
system, Designing learning system, Challenges in ML, Application of ML.
MODULE 2: Linear Regression (with one variable and multiple variables), Gradient Descent,
Classification (Logistic Regression, Over fitting, Regularization, Support Vector Machines),
Decision Trees and issue in decision tree, Bayesian Learning – Bayes Theorem, Concept
Learning, Bayes Optimal Classifier, Naïve Bayes Classifier, Bayesian Belief Networks, EM
Algorithm.
MODULE 3:
MODULE 4:
Artificial Neural Networks, Artificial Perceptron’s, Gradient Descent and The Delta Rule,
Adaline, Multilayer Networks, Back-propagation Rule back-propagation Algorithm-
Convergence.
MODULE 5:
Text Book:
1. Understanding Machine Learning. Shai Shalev-Shwartz and Shai Ben-David. Cambridge
University Press.
Reference Book:
1. Christopher M. Bishop. Pattern Recognition and Machine Learning (Springer)
Computer Science & Engineering and Information Technology
ITP706 "#%!'#" &(%'+ L T P C
3 0 0 3
Course Outcomes: At the end of the course the student will be able to:
% (31=5<7H3 >@=>3<A7BG =4 3@@=@A /<2 @3;3273A 7< >@=13AA3A 7<D=:D7<5 7<4=@;/B7=<
B316<=:=5G
% =<AC;;/B3 9<=E:3253 =4 @7A9 /<2 1=<B@=:A 7< * =>3@/B7=< 7< 7<2CAB@G
% D/:C/B3 /AA3B A/435C/@27<5 2/B/ 7<B35@7BG AGAB3;34431B7D3<3AA /<2 AGAB3;344717 3<1G
% +<23@AB/<2 A=4BE/@3 A31C@7BG /C27B7<5 7<1:C27<5 2/B/0/A3 A31C@7BG /C27B <3BE=@9 A31C@7BG
/C27B /<2 ;71@=1=;>CB3@ A31C@7BG /C27B
=C@A3
$# $# $# $# $# $# $# $# $#
%CB1=;3A
%
%
%
%
%
Detailed syllabus:
Module1
Computer Auditing- System Access control, Data Access Control, Security Administration,
System Design.
Module 2
Hardware Security Controls - The Total System Needs Securing, Levels of Hardware Controls,
Operating System Controls , Access Controls, General-Purpose Operating Systems Security ,
Sources of Additional Information
Module 3
Software Controls - Software Security and Controls, Types of Software Intrusions, Configuration
Management , Modularity and Encapsulation, Protecting Information, Selecting Security
Software, Analysis of Software Products Database Security - Introduction to Databases,
Security Requirements of Databases, Designing Database Security.
Module 4:
Module 5:
:?<=0 #?>.:80=
# 23<B74G B63 34431BA =4 B316<=:=571/: 5@=EB6 =< B63 A=173BG /<2 B63 :7;7B32 </BC@/: @3A=C@13A
# 23<B74G B63 3AA3<13 =4 ACAB/7</0:3 23D3:=>;3<B /<2 E7:: 03 /0:3 B= />>:G />>@=/163A B=
6/<2:3 3<3@5G 1@7A7A /<2 3<D7@=<;3<B >@=B31B7=<
# </:GH3 B63 7;>/1B =4 B316<=:=5G B@/<A43@ /<2 B63 >@=0:3;A =4 ;/< ;/167<3 7<B3@/1B7=<
4=@ B63 6C;/< =>3@/B=@A 7< 3<57<33@7<5 >@=831BA /<2 7<2CAB@73A
# >>:G 7<2CAB@7/: AB/<2/@2A 1=23 =4 3B671A /<2 @=:3 =4 >@=43AA7=</: 3B671A 7< 3<57<33@7<5 473:2
# AA3AA B63 >=AA70:3 D/:C3A 1@7A7A /B 27443@3<B :3D3:A /<2 B63 E/G =CB E7B6 B63 63:> =4 B63
1=<AB7BCB7=< /<2 ;=@/: /<2 3B671/: D/:C3A
#$# !,;;492
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 P10 P11 P12
IT6105.1 - - 2 - - 2 3 - - - - -
IT6105.2 - - 3 - - - 3 - - - - -
IT6105.3 - - 1 - 2 - 2 2 - - - -
IT6105.4 - - 3 - 2 3 - 3 - - - -
IT6105.5 - - 1 - 2 3 - 3 - - - -
Average 2 1.2 1.6 1.6 1.6
6756:G ;=23@/B3 /<2 :=E
!:/?70
)173<13 *316<=:=5G /<2 <57<33@7<5 /A !<=E:3253 /<2 /A )=17/: /<2 &@=43AA7=</: 1B7D7B73A 4431BA =4
*316<=:=571/:@=EB6 (/>72 *316<=:=571/: 5@=EB6 /<2 23>:3B7=< =4 @3A=C@13A(3>=@BA =4 B63 :C0 =4
(=;3 "7;7BA =4 5@=EB6 ACAB/7</0:3 23D3:=>;3<B <3@5G @7A7A (3<3E/0:3 <3@5G (3A=C@13A
!:/?70
!:/?70
*316<=:=5G /<2 23D3:=>7<5 </B7=<A &@=0:3;A =4 *316<=:=5G B@/<A43@ *316<=:=5G /AA3AA;3<B 7;>/1B
/</:GA7A C;/< %>3@/B=@ 7< <57<33@7<5 >@=831BA /<2 7<2CAB@73A &@=0:3;A =4 ;/< ;/167<3
7<B3@/1B7=< ;>/1B =4 /AA3;0:G :7<3 /<2 /CB=;/B7=< C;/< 13<B3@32 *316<=:=5G
!:/?70
B671A =4 &@=43AA7=<
<57<33@7<5 >@=43AA7=< B671/: 7AAC3A 7< 3<57<33@7<5 >@/1B713 =<4:71BA 03BE33< 0CA7<3AA 23;/<2A
/<2 >@=43AA7=</: 723/:A )=17/: /<2 3B671/: @3A>=<A707:7B73A =4 *316<=:=57ABA =23A =4 >@=43AA7=</:
3B671A-67AB:3 0:=E7<5/<2 03G=<2 /A3 ABC273A
!:/?70
,/:C3 @7A7A 7< 1=<B3;>=@/@G A=173BG $/BC@3 =4 D/:C3A ,/:C3 )>31B@C; =4 / J5==2K :743 &AG16=:=571/:
D/:C3A <B35@/B32 >3@A=</:7BG ;3<B/: 63/:B6 )=173B/: D/:C3A *63 ;=23@< A3/@16 4=@ / J5==2K A=173BG
8CAB713 23;=1@/1G A31C:/@7A; @C:3 =4 :/E D/:C3A 7< <27/< =<AB7BCB7=< 3AB63B71 D/:C3A &3@13>B7=<
/<2 3<8=G;3<B =4 03/CBG A7;>:717BG 1:/@7BG #=@/: /<2 3B671/: D/:C3A $/BC@3 =4 ;=@/: 8C25;3<BA
1/<=<A =4 3B671A 3B671A =4 D7@BC3 3B671A =4 2CBG 3B671A =4 @3A>=<A707:7BG
)B3>63< +<53@ =<B@=::7<5 *316<=:=5G B671A /<2 B63 (3A>=<A70:3 <57<33@A =6< -7:3G
)=<A $3E .=@9 <2 27B7=<
30=@/6 =6<A=< B671/: AAC3A 7< <57<33@7<5 &@3<B713 /:: <5:3E==2 :744A $3E 3@A3G
$ *@7>/B67 C;/< D/:C3A 7< B63 <57<33@7<5 &@=43AA7=< #=<=5@/>6 >C0:7A632 0G #
/:1CBB/
#793 #/@B7< /<2 (=</:2 )167<H7<53@ LB671A 7< <57<33@7<5M #1@/E7:: $3E .=@9
6/@:3A /@@7A #716/3: ) &@7B16/@2 /<2 #716/3: (/07<A L<57<33@7<5 B671A =<13>BA /<2
/A3AM *6=;>A=< "3/@<7<5
=D7<2/@/8/< # $/B/@/8/< ) )3<B67: !C;/@ , ) L<57<33@7<5 B671AM &@3<B713 /:: =4 <27/
$3E 3:67
6/@:3A :3223@;/< <57<33@7<5 B671AM &@3<B713 /:: $3E #3F71=
2;C<2 )330/C3@ /<2 (=03@B " /@@G C<2/;3<B/:A =4 B671A 4=@ )173<B7ABA /<2 <57<33@AM
%F4=@2 +<7D3@A7BG &@3AA %F4=@2
/D72 @;/<< /<2 #7163:3 ) )6/C4 L=;>CB3@A B671A /<2 )=173BGM %F4=@2 +<7D3@A7BG &@3AA
Computer Science & Engineering and Information Technology
CSO712 %+$'#%$+ L T P C
3 0 0 3
:?<=0 #?>.:80
.1 Explain the basics of network security and compare various encryption techniques.
.2 Summarize the functionality of public key cryptography
.3 Apply various message authentication functions and secure algorithms
.4 Demonstrate different types of security systems and describe different levels o f
security and services.
#$# !,;;492
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 P10 P11 P12
' - - - - 2 - - - - 1 - 1
' - 2 - - 2 - - - - - - -
' 3 2 - - 2 1 - - - - 1 -
' - 3 1 - - 2 - 3 - - - -
@0<,20 0.75 1.75 0.25 0 1.5 0.75 0 0.75 0 0.25 0.25 0.25
:?<=0 0=.<4;>4:9
!#(
!#(
$?-74. 60C .<C;>:2<,;3C ,9/ !0==,20 ?>309>4.,>4:9 >>@=/163A B= #3AA/53 CB63<B71/B7=< )
# &C0:71 93G 1@G>B=5@/>6G &@7<17>:3A () 757B/:)75</BC@3A !3G #/</53;3<B
!#(
"0>A:<6 &0.?<4>C ;;74.,>4:9= !3@03@=A #=B7D/B7=< !3@03@=A D3@A7=< && $=B/B7=< &&
%>3@/B7=</: 3A1@7>B7=<
!#(
*0- &0.?<4>C -30 )31C@7BG *6@3/BA -30 *@/4471 )31C@7BG >>@=/163A %D3@D73E =4 )31C@3 )=193B "/G3@
/<2 *@/<A>=@B "/G3@ )31C@7BG %D3@D73E =4 )31C@3 :31B@=<71 *@/<A/1B7=<
!#(
9><?/0<= ,9/ )4<?=0= <B@C23@A <B@CA7=< *316<7?C3A &/AAE=@2 &@=B31B7=< &/AAE=@2 A3:31B7=<
)B@/B3573A <B@CA7=< 3B31B7=< #/:717=CA &@=5@/;A $/BC@3 =4 D7@CA3A *G>3A =4 D7@CA3A #/1@= D7@CA3A
<B7D7@CA >>@=/163A
E<C;>:2<,;3C ,9/ "0>A:<6 &0.?<4>C $<49.4;70= ,9/ $<,.>4.0=F :?<>3 /4>4:9 *4774,8
&>,77492= $?-74=30< $<09>4.0 ,77
E<C;>:2<,;3C 9/ "0>A:<6 &0.?<4>CF !.<,A 477 03<:?D
ITO711 INFORMATION SECURITY L3 –T0 –P 0 Credit 3
Course Outcomes: At the end of the course the student will be able to:
% (31=5<7H3 >@=>3<A7BG =4 3@@=@A /<2 @3;3273A 7< >@=13AA3A 7<D=:D7<5 7<4=@;/B7=<
B316<=:=5G
% =<AC;;/B3 9<=E:3253 =4 @7A9 /<2 1=<B@=:A 7< * =>3@/B7=< 7< 7<2CAB@G
% +<23@AB/<2 A=4BE/@3 A31C@7BG /C27B7<5 7<1:C27<5 2/B/0/A3 A31C@7BG /C27B <3BE=@9 A31C@7BG
/C27B /<2 ;71@=1=;>CB3@ A31C@7BG /C27B
=C@A3
$# $# $# $# $# $# $# $# $#
%CB1=;3A
%
%
%
%
%
Detailed syllabus:
Module1
Computer Auditing- System Access control, Data Access Control, Security Administration,
System Design.
Module 2
Hardware Security Controls - The Total System Needs Securing, Levels of Hardware Controls,
Operating System Controls , Access Controls, General-Purpose Operating Systems Security ,
Sources of Additional Information
Module 3
Software Controls - Software Security and Controls, Types of Software Intrusions, Configuration
Management , Modularity and Encapsulation, Protecting Information, Selecting Security
Software, Analysis of Software Products Database Security - Introduction to Databases,
Security Requirements of Databases, Designing Database Security, Methods of Protection,
Security of Multilevel Databases,The Future of Databases. Network and Telecommunication
Security - Telecommunications and Networks, Security Considerations, Cases in Point, Special
Communications, Security Considerations.
Module 4
LIST OF EXPERIMENTS