M.Sc. Computer Science Syllabus 2021-22
M.Sc. Computer Science Syllabus 2021-22
Duration: 2 years
Programme • 1. The broad objective of the programme is to prepare students
Outcomes: for productive careers in academia and computing industry by
providing smooth environment for teaching and research in the
core and applied areas of the discipline.
List of Courses:
Semester Course Title of the Course Core/Ele Credits
Code ctive/
L-T-L-C
Soft
Skill
I MSI C421 Mathematics for Computer Science C 3-1-0-4
Methods of assessment:
Recall (K1) - Simple definitions, MCQ, Recall steps, Concept definitions
Understand/ Comprehend (K2) - MCQ, True/False, Short essays, Concept explanations, Short
summary or overview
Application (K3) - Suggest idea/concept with examples, Suggest formulae, Solve problems,
Observe, Explain
Analyse (K4) - Problem-solving questions, Finish a procedure in many steps, Differentiate
between various ideas, Map knowledge
Evaluate (K5) - Longer essay/ Evaluation essay, Critique or justify with pros and cons
Create (K6) - Check knowledge in specific or offbeat situations, Discussion, Debating or
Presentations
MSIC421 Mathematics for Computer Science 3-1-0-4
Course • 1 Learn and recall allied level mathematics for application problems.
Outcomes
• 2 To understand the role of linear algebra and matrix in computer science
problem solving.
• 3 Learn and understand unit step function and Dirac delta function. To
study orthogonal functions and Fourier transforms and understand their
use in computational problems.
• 4 Learn the concepts of number theory for cryptography.
• 5 Critically analyze and implement programs for the methods studied
for a set of selected example problems..
Course Code MSIC421/Core
Units
I Set theory: Operations on sets – Basic set identities – Relations and orderings – Functions -8 Hrs
II Linear algebra Part I: Linear vector spaces - Linear operators – vectors in n-dimensions – matrix
representation of vectors and operators in a basis – linear independence, dimension – inner
product – Orthonormal basis –Eigenvalues and eigenfunctions of operators/matrices – Eigen
basis, Diagonalizing matrix – Quadratic forms – Complex matrices and forms - Hermitian and
Unitary operators/matrices. 15 Hrs
III Linear algebra Part II: Cayley-Hamilton Theorem - Gram-Schmidt process –Eigen values
using QR transformations – QR factorization - generalized eigenvectors –– singular value
decomposition and applications - pseudo inverse – least square approximations -Toeplitz
matrices and some applications. 10 Hrs
IV Laplace Transforms : Solution of linear differential equations with constant coefficients- – Unit
step function and Dirac delta function. Sturm-Liouville theory: Second order linear differential
equations . Strum-Liouville theory: Orthogonality of eigenfunctions – Illustration with
Legendre, Laguerre, Hermite, Chebyshev differential equations - expansion of polynomials.
Fourier Transforms: Fourier sine and cosine transforms – Fourier transform - convolution
theorem - Discrete Fourier transform and Fast Fourier transform. 15 Hrs
V Number Theory: Modular arithmetic - Fermat’s and Euler’s theorem – Testing for primality -
Chinese remainder theorem – Discrete logarithms – Groups – Rings – Fields - Finite fields –
GF(p) - Polynomial arithmetic – Finite fields of the form GF(2n). 12 Hrs
3 [Link]
4 [Link]
Recomm 1. J P Tremblay and R Manohar, Discrete Mathematical Structures with Applications to
ended Computer Science, International Edition (McGraw-Hill, Singapore, 1987; Tata
Texts McGraw-Hill, New Delhi, 1997).
th
2. E Kreyszig, Advanced Engineering Mathematics, 10 Edition (Wiley, NY, 2011).
3. M D Greenberg, Advanced Engineering Mathematics, 2nd Edition, Prentice-Hall 1998.
4. R. Bronson, G. [Link], “Linear Algebra”, 2nd Ed., Academic Press, 2007.
5. R. Bronson, “Matrix Operation”, Schaum‟s Outline Series, 2nd Ed., McGraw Hill, 2011.
6. G. James, “Advanced Modern Engineering Mathematics”, 3rd edition, Pearson/Prentice
Hall, 2004.
7. P. V.O'Neil, “Advanced Engineering Mathematics” , 7th Ed., Cengage Learning, 2011.
8. W. Stallings, Cryptography and Network Security Principles and Practice, 7th
edition, Pearson Education, 2017.
9. D. R. Stinson and M. B. Paterson, Cryptography Theory and Practice, 4th
Edition, CRC Press 2019.
10. Hans Delfs , and Helmut Knebl, Introduction to Cryptography Principles and
Applications, 3rd Edition, 2015 Springer.
Course designed by Prof. P. Thangavel
Method of Evaluation:
Sessional I Sessional II End Semester Total Grade
Examination
20 20 60 100 As per
University’s
K1, K2, K4 &K5 K1, K2, K3, K4 K1, K2, K3, K4
common
& K6 K5 & K6
systems
Methods of assessment: (As per common pattern.) Recall (K1), Understand/ Comprehend
(K2), Application (K3), Analyse (K4), Evaluate (K5), Create (K6)
Mapping with Programme Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10
CO 1 M S M S M S L M L M
CO 2 S S L S S M L M L L
CO 3 S M S S S M L S M L
CO 4 S S S S S S M S L L
CO 5 M S S M M L S L L L
S-Strong M-Medium L-Low
Units
I Introduction to formal proof – Additional forms of proof – Inductive proofs –Finite
Automata (FA) – Deterministic Finite Automata (DFA) – Non-deterministic Finite
Automata (NFA) – Finite Automata with Epsilon transitions. (12 Hrs)
II Regular Expression – FA and Regular Expressions – Proving languages not to be
regular – Closure properties of regular languages – Equivalence and minimization of
Automata. (12 Hrs)
III Context-Free Grammar (CFG) – Parse Trees – Ambiguity in grammars and
languages – Definition of the Pushdown automata – Languages of a Pushdown
Automata –Equivalence of Pushdown automata and CFG– Deterministic Pushdown
Automata. (15 Hrs)
IV Normal forms for CFG – Pumping Lemma for CFL – Closure Properties of CFL –
Turing Machines – Programming Techniques for TM. A language that is not
Recursively Enumerable (RE) – An undecidable problem RE – Undecidable
problems about Turing Machine – Post’s Correspondence Problem – The classes P
and NP. (16 Hrs)
Reading List 1. [Link]
2. [Link]
(Online) 3. [Link]
Recommende [Link] Linz, “An Introduction to Formal Languages and Automata”, Third
d Texts Edition ,Narosa, 2005
2. J.E. Hopcroft, R. Motwani and J.D. Ullman, “Introduction to Automata
Theory, Languages and Computations”, second Edition, Pearson Education,
2007.
Methods of assessment: (As per common pattern.) Recall (K1), Understand/ Comprehend
(K2), Application (K3), Analyse (K4), Evaluate (K5), Create (K6)
Mapping with Programme Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10
CO 1 L L L L L L L M L L
CO 2 M S L M S M M M S M
CO 3 M M M S M M S S M S
CO 4 M S M S S S M M S S
CO 5 S S M M M S S S S S
S-Strong M-Medium L-Low
Course Outcomes • Learn about simple problems and complexity of their solutions.
• To understand the role of algorithms in problem solving. Learn
and understand the asymptotic analysis of algorithms.
• Learn and analyze various algorithm design methods through
general principles and with select set of example problems.
• Conceptualize and use these methods to solve complex real world
problems particularly problems involved in industrial projects.
• 5 Critically analyze and compare the algorithms for a set of
selected example problems which are hard in nature with design
approaches like greedy, dynamic programming and branch and
bound etc.
Course Code MSIC423/Core
III Spanning trees, connected components and biconnected components. Greedy method:
General method, applications-Job sequencing with deadlines, knapsack problem, Minimum
cost spanning trees, Single source shortest path problem. 12 Hrs
IV Dynamic Programming: General method, applications-Matrix chain multiplication, 0/1
knapsack problem, All pairs shortest path problem, Travelling sales person problem.
Backtracking: General method, applications-n-queen problem, sum of subsets problem,
graph coloring, Hamiltonian cycles. 13 Hrs
V Branch and Bound: General method, applications - Travelling sales person problem, 0/1
knapsack problem- LC Branch and Bound solution, FIFO Branch and Bound solution - Basic
concepts NP-Hard and NP-Complete problems. 10 Hrs
Method of Evaluation:
Sessional I Sessional II End Semester Total Grade
Examination
20 20 60 100 As per
University’s
K1, K2, K4 &K5 K1, K2, K3, K4 K1, K2, K3, K4
common
& K6 K5 & K6
systems
Methods of assessment: (As per common pattern.) Recall (K1), Understand/ Comprehend
(K2), Application (K3), Analyse (K4), Evaluate (K5), Create (K6)
Mapping with Programme Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10
CO 1 M S M S M S L M L M
CO 2 S S L S S M L M L L
CO 3 S M S S S M L S M L
CO 4 S S S S S S M S L L
CO 5 M S S M M L S L L L
S-Strong M-Medium L-Low
III Graphs – representation, breadth first search and depth first search with spanning trees, Bi-
connected components 6 Hrs
IV Greedy methods – general knapsack, minimum cost spanning tree, Dijkstra’s single source
shortest path algorithm – Dynamic Programming: 0/1 knapsack problem 6 Hrs
V Backtracking: N-queens problem, Sum of Subsets problem – Branch and bound: Job
scheduling and 0/1 knapsack problem. 6 Hrs
Method of Evaluation:
Sessional I Sessional II End Semester Total Grade
Examination
20 20 60 100 As per
University’s
K1, K2, K4 &K5 K1, K2, K3, K4 K1, K2, K3, K4
common
& K6 K5 & K6
systems
Methods of assessment: (As per common pattern.) Recall (K1), Understand/ Comprehend
(K2), Application (K3), Analyse (K4), Evaluate (K5), Create (K6)
Mapping with Programme Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10
CO 1 M S M S M S L M L M
CO 2 S S L S S M L M L L
CO 3 S M S S S M L S M L
CO 4 S S S S S S M S L L
CO 5 M S S M M L S L L L
S-Strong M-Medium L-Low
MSIC425 Computer Networks 3-1-0-4
Course Outcomes • Learn and understand the basic concepts of networking and its
applications. To understand well established layered
architectures in computer networks
• Understand the concepts of the transmission medium, modulation
and multiplexing techniques
• Learn and understand well established error detection and
correction codes and various protocols used in dealing with point
to point and broad cast communications systems data link layer.
• Comprehend the design issues and to assess the routing and
congestion control algorithms.
• 5 Enumerate the transport layer service, conceptualize the
internet transport protocols and the network security.
Course Code MSIC425/Core
II Physical layer - Transmission media - Guided and wireless – Digital Modulation and
multiplexing – Public switched Telephone network. 12 Hrs
III Data link layer Design issues - error detection and correction - elementary data link
protocols - sliding window protocols - Packet over SONET- ADSL. MAC sublayer
protocols. 14 Hrs
Course designed by: Prof. P. Thangavel and Ms. S. Gaythri Devi (Guest Faculty)
Method of Evaluation:
Sessional I Sessional II End Semester Total Grade
Examination
20 20 60 100 As per
K1, K2, K4 &K5 K1, K2, K3, K4 K1, K2, K3, K4 University’s
& K6 K5 & K6 common
systems
Methods of assessment: (As per common pattern.) Recall (K1), Understand/ Comprehend
(K2), Application (K3), Analyse (K4), Evaluate (K5), Create (K6)
Mapping with Programme Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10
CO 1 M S M S M S L M L M
CO 2 S S L S S M L M L L
CO 3 S M S S S M L S M L
CO 4 S S S S S S M S L L
CO 5 M S S M M L S L L L
Course On the successful completion of the course, student will be able to:
Objectives
• Define Artificial intelligence and identify problems for AI.
Recall (K1) Characterize the search techniques to solve problems and
Understand/Com recognize the scope of classical search techniques(K1)
prehend (K2) • Apply basic principles of AI in solutions that require problem
Apply Knowledge solving, inference, perception, knowledge representation, and
(K3) learning. (K2 & K3)
Analyze and • Demonstrate handling of uncertain knowledge and reasoning in
Evaluate (K4 and probability theory. (K3)
K5) • Explain and Evaluate learning methods in AI (K4 & K5)
• Conceptualize an ability to share in discussions of AI, its current
Create (K6) scope and limitations, and societal implications. (K5 & K6)
Units
I Defining AI- Acting Humanly (Turing Test Approach)- Thinking
Humanly(Cognitive Modeling Approach)- Thinking Rationally (laws of
thought approach)- Acting Rationally(Rational Agent Approach)-
Foundations of Artificial Intelligence- History of AI- AI techniques-
Expert Systems. (12 hrs)
II Defining the problem as a State Space Search Strategies: Breadth – first
Search- Depth- first search- Depth limited search - Iterative Deepening
depth first search. (10 hrs)
III Hill Climbing- Simulated Annealing- Best First Search: OR Graphs-
Heuristic Functions- Branch & Bound, A* Algorithm- AND –OR
graphs- AO* Algorithm. (10 hrs)
IV Representations and mappings- Approaches to knowledge
Representation- Procedural versus Declarative knowledge- Predictive
Logic: Representing Simple facts- Instance and Isa relationships in
Logic- Proposition versus Predicate Logic- Computable Functions and
Predicates- not- Rules of Inferences and Resolution-not- Forward versus
Backward Reasoning- Logic Programming and Horn Clauses.
Evolutionary Algorithms - Population Based Search: Genetic
Algorithms, Ant Colony Optimization, Dynamic programming,
Traveling Salesman Problem. (16 hrs)
V Foundations for Connectionist Networks- Biological Inspiration-
Different Architectures and output functions: Feed forward- Feedback-
Recurrent Networks- step- Sigmoid and different functions. Markov
decision processes -MDPs, policy evaluation, value iteration,
Reinforcement learning- Monte Carlo, SARSA, Q-learning -
Exploration/exploitation, function approximation (12 Hrs)
Reading List Online
1. [Link]
2. [Link]
3. [Link]
4. [Link]
5. [Link]
Recommended 1. Russell, Stuart, and Norvig, Peter. Artificial Intelligence:
Texts A Modern Approach. N.p., CreateSpace Independent
Publishing Platform, 2016.
2. Nilsson, Nils Johan, and Nilsson, Nils J. Artificial
Intelligence: a new synthesis. United Kingdom, Morgan
Kaufmann Publishers, 1998.
3. Khemani, Deepak. A First Course in Artificial
Intelligence. India, McGraw Hill Education (India), 2013.
4. Back, Thomas. Evolutionary Algorithms in Theory and
Practice: Evolution Strategies, Evolutionary
Programming, Genetic Algorithms. United
Kingdom, Oxford University Press, 1995.
5. Gen, Mitsuo, and Yu, Xinjie. Introduction to Evolutionary
Algorithms. United Kingdom, Springer London, 2010.
6. Reinforcement Learning. Croatia, InTech, 2008.
Course Designed by [Link]
Method of Evaluation:
Sessional I Sessional II End Semester Total Grade
Examination
20 20 60 100 As per
University’s
K1, K2, K4 &K5 K1, K2, K3, K4 K1, K2, K3, K4
common
& K6 K5 & K6
systems
CO 1 L L L L L L L M L L
CO 2 M S L M S M M M S M
CO 3 M M M S M M S S M S
CO 4 M S M S S S M M S S
CO 5 S S M M M S S S S S
Course Outcomes 1. Compare the manual file system with data base
systems
2. Design efficient database structures
Draft SQL queries for data access and manipulation
3. Recognize suitable storage structures
Evaluate query performances
4. Explain the transaction processing steps and
procedures
Understand the concurrency and recovery protocols
5. Demonstrate different server architectures and their
functionalities
Recall the concepts and apply in the given case study
Course I Core
Method of Evaluation:
Sessional I Sessional II End Semester Total Grade
Examination
20- (Section A 20- (Section A 60- (Section A K1- 100 As per
K1-5 – answer all K1-5 – answer all 5 – answer all – UNOM
- each1 mark & - each1 mark & each 2 mark & guidelines
Section B K2, K3, Section B K2, K3, Section B K2, K3,
K4, K5 – any 3/5 K4, K5 – any 3/5 K4, K5 – internal
each 5 marks ) each 5 marks ) choice from each
unit -- each 10
marks )
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10
CO 1 M S S M S S M M S L
CO 2 M S M M M S L L M L
CO 3 M M S M M S M L M L
CO 4 M M S M M M M S M L
CO 5 S S S S M S S S S S
Method of Evaluation:
Sessional I Sessional II End Semester Total Grade
Examination
20- (Section A 20- (Section A 60- (Section A K1- 100 As per
K1-5 – answer all K1-5 – answer all 5 – answer all – UNOM
- each1 mark & - each1 mark & each 2 mark & guidelines
Section B K2, K3, Section B K2, K3, Section B K2, K3,
K4, K5 – any 3/5 K4, K5 – any 3/5 K4, K5 – internal
each 5 marks ) each 5 marks ) choice from each
unit -- each 10
marks )
Methods of assessment:
Recall (K1) - Simple definitions, MCQ, Recall steps, Concept definitions
Understand/ Comprehend (K2) - MCQ, True/False, Short essays, Concept explanations, Short
summary or overview
Application (K3) - Suggest idea/concept with examples, Suggest formulae, Solve problems,
Observe, Explain
Analyse (K4) - Problem-solving questions, Finish a procedure in many steps, Differentiate
between various ideas, Map knowledge
Evaluate (K5) - Longer essay/ Evaluation essay, Critique or justify with pros and cons
Create (K6) - Check knowledge in specific or offbeat situations, Discussion, Debating or
Presentations
CO 1 M S S M S S M M S S
CO 2 M S M M M S L S S S
CO 3 M M S M M S M S S S
CO 4 M M S M M M M S S S
CO 5 S S S S M S S S S S
Create(K6)
Units
I The Machine Learning Landscape - Types of Machine Learning Systems
- Main Challenges of Machine Learning - End-to-End Machine Learning
Project - Look at the Big Picture - Get the Data - Discover and Visualize
the Data to Gain Insights - Prepare the Data for Machine Learning
Algorithms - Select and Train a Model - Fine-Tune Your Model -
Launch, Monitor, and Maintain Your System. (12 Hrs)
II Tasks – Models – Features, Overfitting vs Under fitting. Bias Vs
Variance. Measuring Model Accuracy- Supervised Learning:
Classification – Binary classification and related tasks – Scoring and
ranking – class probability estimation – Multi-class classification - Naive
Bayes Regression, Multiple Regression Unsupervised Learning: –
Distance-based clustering – K-Means algorithm – Hierarchical
clustering. (12 Hrs)
III Decision trees – Ranking and probability estimation trees – tree learning
as variance reduction. Linear Models: The least-squares method–
Support vector machines. Model ensembles: Bagging and random forests
– Boosting – Mapping the ensemble landscape. Machine Learning
experiments: What to measure – How to measure it – How to interpret
[Link]: Kinds of features – Feature transformations – Feature
construction and selection. (12 Hrs)
IV The perceptron - Neural Network - Linear Vs Nonlinear Models. How
Neural Network Works? -Architecture Neural Network, Deep Neural
Network -Gradient Descent -Cost Function -Derivatives-Computation
graph-Derivatives with a Computation Graph-Logistic Regression
Gradient Descent-Vectorization-Explanation of logistic regression cost
function-Explanation for Vectorized Implementation -Activation
functions-Derivatives of activation-Backpropagation-Random
Initialization. (12 Hrs)
V Hyper parameter tuning, Regularization and Optimization ,Forward
Propagation in a DNN -Getting your matrix dimensions right-Building
blocks of deep neural networks-Forward and Backward Propagation-
Parameters vs Hyper parameters-Train / Dev / Test - Bias / Variance-
Regularization -Why regularization reduces over fitting - Dropout
Regularization - Understanding Dropout -Other regularization methods -
Normalizing inputs -Vanishing / Exploding gradient-Weight
Initialization for Deep Networks -Numerical approximation of gradient-
Gradient checking . Train a logistic regression using Neural Network.
(12 Hrs.)
Reading List 1. [Link]
2. [Link]
(Online)
3. [Link]
4. [Link]
Recommended 1. Flach, P, “Machine Learning: The Art and Science of Algorithms that
Texts Make Sense of Data”, Cambridge University Press, 2012
2. AurélienGéron, “Hands-On Machine Learning with Scikit-Learn and
TensorFlow: Concepts, Tools, and Techniques to Build Intelligent
Systems”, First Edition, 2017 (Chapters 1 and 2)
3. Neural Networks and Deep Learning from Deep Learning
Specialization:[Link]
4. Improving Deep Neural Networks: Hyper parameter tuning,
Regularization and Optimization from Deep Learning
Specialization:[Link]
CO 1 L L L L L L L M L L
CO 2 M S L M S M M M S M
CO 3 M M M S M M S S M S
CO 4 M S M S S S M M S S
CO 5 S S M M M S S S S S
Course Outcomes • Learn about the Basic concepts of Image representation and processing
techniques.
• Understand the various Image processing techniques such as Color
Transformation, Image Enhancement, compression and Filtering.
• Visualize the processed images and differentiate the spatial and
frequency domain to transform the idea into real world entity.
• Familiarize the use of Software tools like MATLAB, C++, Python or
java software.
• Understand how image is represented and apply the operations on images
to develop the real time applications.
Course I Core
Course Code MSI C430
Title of the DIGITAL IMAGE PROCESSING
Course:
Credits: L-T-P-C 3-1-0-4
Pre-requisites Students should know any one programming basics of C++, Python or java,
Computer Graphics to study the 2D and 3D Array Representation.
Course The main objectives of this course are to:
Objectives • Study the fundamental components of image processing and machine
learning techniques. (K1 & K2)
• Understand the Programming Software’s and apply the project. (K1 &
K2)
• Know the in-depth knowledge of implementing the imaging concepts.
(K3 & K4)
• Understand the Image processing techniques (K2 & K3)
• To apply the concepts in real time applications (medical images, video
images etc). (K5 & K6)
K1 - Recall; K2 - Understand; K3 - Apply; K4 - Analyze; K5 - Evaluate; K6 - Create
UNITS
Unit I INTRODUCTION OF IMAGE PROCESSING 12 hours
Introduction – The origin - Fundamental steps components - Image Sampling and Quantization –
Some basic relationship between pixels – Linear and nonlinear operations. Image Enhancement in
spatial domain – Some Basic Gray level transformation – Histogram processing- Enhancement using
Arithmetic Logic operations – Basics of spatial filtering – smoothing – sharpening – Image
Enhancement in frequency domain
Unit II COLOR IMAGE PROCESSING 11 hours
Color Image processing – color models – pseudo color Image processing – Smoothing – Sharpening –
Color transformation - Color segmentation
Unit III IMAGE COMPRESSION 12 hours
Wavelets – Multi resolution Processing – Image compression models – Lossy compression – Image
Compression standards.
Unit IV IMAGE SEGMENTATION 10 hours
Image segmentation – Edge Linking – Boundary Detection – Thresholding – Region Based
segmentation by morphological watersheds
Unit V CASE STUDIES 15 hours
Implement a Complete Project with reference to syllabus and online content-Team wise.
Total Lecture hours 60 hours
Reading List 1. R. C. Gonzalez and R. E. Woods, Digital image processing, 3/e. PH, 2007.
Recommended 1. Anil K. Jain, Fundamentals of Digital Image Processing, Pearson, 1989
Texts
Related Online Contents [MOOC, SWAYAM, NPTEL, Websites etc.]
1. [Link]
2. [Link]
3. [Link]
4. [Link]
5. [Link]
Course Designed By: [Link]. Chithra
Method of Evaluation:
Sessional I Sessional II End Semester Total Grade
Examination
20- (Section A 20- (Section A 60- (Section A K1- 100 As per
K1-5 – answer all K1-5 – answer all 5 – answer all – UNOM
- each1 mark & - each1 mark & each 2 mark & guidelines
Section B K2, K3, Section B K2, K3, Section B K2, K3,
K4, K5 – any 3/5 K4, K5 – any 3/5 K4, K5 – internal
each 5 marks ) each 5 marks ) choice from each
unit -- each 10
marks )
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10
CO 1 M S M S M S M M L S
CO 2 S S L S S M L M S S
CO 3 S M S L S M L S S S
CO 4 S S S S S S M S M L
CO 5 S S S S L S M S S L
*S-Strong M-Medium L-Low
Course I Core
Method of Evaluation:
Sessional I Sessional II End Semester Total Grade
Examination
20- (Section A 20- (Section A 60- (Section A K1- 100 As per
K1-5 – answer all K1-5 – answer all 5 – answer all – UNOM
- each1 mark & - each1 mark & each 2 mark & guidelines
Section B K2, K3, Section B K2, K3, Section B K2, K3,
K4, K5 – any 3/5 K4, K5 – any 3/5 K4, K5 – internal
each 5 marks ) each 5 marks ) choice from each
unit -- each 10
marks )
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10
CO 1 M S S M S S M M S L
CO 2 M S M M M S L L M L
CO 3 M M S M M S M L M L
CO 4 M M S M M M M S M L
CO 5 S S S S M S S S S S
III Public key cryptosystems - RSA algorithm - Diff – Hellman key exchange – Elgamal
cryptographic system – Elliptic curve cryptography. 12 Hrs
IV Hash functions - Hash functions based on cipher block chaining - Secure Hash algorithms
(SHA) – SHA-3 - Message authentication codes – Authentication functions - Message
authentication codes (MAC) . 14 Hrs
Method of Evaluation:
Sessional I Sessional II End Semester Total Grade
Examination
20 20 60 100 As per
University’s
K1, K2, K4 &K5 K1, K2, K3, K4 K1, K2, K3, K4
common
& K6 K5 & K6
systems
Methods of assessment: (As per common pattern.) Recall (K1), Understand/ Comprehend
(K2), Application (K3), Analyse (K4), Evaluate (K5), Create (K6)
CO 1 S S M S M S L M L M
CO 2 S S L S S M L M L L
CO 3 S M S S S M M S M L
CO 4 S S S S S S M S L L
CO 5 M S S M M L S L L L
S-Strong M-Medium L-Low
Method of Evaluation:
Sessional I Sessional II End Semester Total Grade
Examination
20 20 60 100 As per
University’s
K1, K2, K4 &K5 K1, K2, K3, K4 K1, K2, K3, K4
common
& K6 K5 & K6
systems
Methods of assessment: (As per common pattern.) Recall (K1), Understand/ Comprehend
(K2), Application (K3), Analyse (K4), Evaluate (K5), Create (K6)
Mapping with Programme Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10
CO 1 S S S M M M M M M L
CO 2 S S S S S S S M M M
CO 3 S S S S S S S M M M
CO 4 S S S S S S S M M S
CO 5 S S S M M M M M M L
*S-Strong M-Medium L-Low
MSI C434 PROJECT WORK 0-0-15-15
Course Outcomes • Learn about the Basic concepts of necessary software to implement
selected project.
• Understand and design Software development life cycle.
• Apply the various software domains with database
• Analysis the project modules and create the framework.
• Perform Project related test and maintain software documents.
Course I Core
Course Code MSI C434
Title of the PROJECT WORK
Course:
Credits: L-T-P-C 0-0-15-15
Pre-requisites Students should know the software Engineering, software applications, tools and
database.
Course The main objectives of this course are to:
Objectives • To develop real time applications with directions of corporate companies.
(K1 & K2)
• Understand the Core topics (K1 & K2)
• Develop the commercial or scientific applications. (K3 & K4)
• To equip the students with real time exposure in order to make them
employable. (K2 & K3)
• Deploy the real time project as full stack developer. (K5 & K6)
K1 - Recall; K2 - Understand; K3 - Apply; K4 - Analyze; K5 - Evaluate; K6 - Create
PROJECT WORK 18 weeks
Each student will do a project work in an industry or in the department with an external guide in the
industry and an internal guide in the department. The guides will periodically monitor the progress.
Course Designed By: All Faculty
Method of Evaluation:
Sessional I Sessional II End Semester Total Grade
Examination
20- (Section A 20- (Section A 60- (Section A K1- 100 As per
K1-5 – answer all K1-5 – answer all 5 – answer all – UNOM
- each1 mark & - each1 mark & each 2 mark & guidelines
Section B K2, K3, Section B K2, K3, Section B K2, K3,
K4, K5 – any 3/5 K4, K5 – any 3/5 K4, K5 – internal
each 5 marks ) each 5 marks ) choice from each
unit -- each 10
marks )
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10
CO 1 M S M S M S M M L S
CO 2 S S L S S M L M S S
CO 3 S M S L S M L S S S
CO 4 S S S S S S M S M L
CO 5 S S S S L S M S S L
*S-Strong M-Medium L-Low
Course • Generalize the various concept of hyper text markup language of the World wide
Outcomes: web
• Describe the various concept of extended markup language
• Understand the fundamentals of C# concepts and sample programming
• Obtain the fundamentals of [Link] and sample programming
• Summarise the fundamentals of DTHTML and Java script and sample
programming
Course 2: Elective
Title of the Web Based Application Development
Course:
Course MSIE406
Code:
Credits: L T P C
3 0 1 4
Pre- Student should know the fundamentals about internet, www, concept of web pages
requisites, if
any:
Course Students were able to
Objectives • Identify the Accessibility of variables and its scope of operations in .NET
Recall - K1 framework (K1)
Understand/ • Describe the HTML Control classes, Web Control Classes and its Events (K1,K2)
Comprehend • Employ the Validation Controls in developing a web based programs.
- K2 (K1,K3&K5)
Apply • Analyse the User Controls and Views for the Data Access in web pages (K5,K6).
Knowledge - • Critically access the Error Handing & Exception Handling (K4,K6)
K3 • Conceive the Data controls formatting, Selecting and editing in web based
Analyze and application. Theorise the Authentication and Authorization of Web events.
Evaluate - (K3,K4 & K6)
K4 and K5
Create -
K6
UNITS
UNIT -I OVERVIEW OF [Link]
The .NET framework – The C# Language: Data types – Declaring variables- Scope and Accessibility-
Variable operations- Object Based manipulation- Conditional Structures- Loop Structures- Methods.
Types, Objects and Namespaces : The Basics about Classes- Value types and Reference types-
Understanding name spaces and assemblies - Advanced class programming.
UNIT-II DEVELOPING [Link] APPLICATIONS
The Anatomy of a Web Form – Writing Code - Visual Studio Debugging. Web Form Fundamentals: The
Anatomy of an [Link] Application - Introducing Server Controls - HTML Control Classes - The Page
Class - Application Events - [Link] Configuration. Web Controls: Web Control Classes - List
Controls - Web Control Events and AutoPostBack - A Simple Web Page.
UNIT-III ERROR HANDLING, LOGGING, AND TRACING
Error Handling, Logging, and Tracing: Common Errors - Exception Handling - Handling Exceptions -
Throwing Your Own Exceptions - Logging Exceptions - Page Tracing. State Management: View State -
Transferring Information Between Pages – Cookies - Session State - Session State Configuration -
Application State. Validation: Understanding Validation - The Validation Controls.
UNIT-IV RICH CONTROLS
The Calendar - The AdRotator - Pages with Multiple Views - User Controls and Graphics - User Controls
- Dynamic Graphics . Website Navigation: Site Maps - URL Mapping and Routing - The SiteMapPath
Control - The TreeView Control - The Menu Control. [Link] Fundamentals: The Data Provider
Model - Direct Data Access - Disconnected Data Access.
Method of Evaluation:
Sessional I Sessional II End Semester Total Grade
Examination
20 20 60 100 As per
K1, K2, K4 & K5 K1, K2, K4 & K6 K1, K2 ,K4, K5 & University
K6 Norm
Methods of assessment:
Recall (k1), Understand / Comprehend (K2), Application (K3), Analyses (K4), Evaluate(K5),
Create(K6)
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M S M S M S L M L L
CO2 S S L S S S M L M M
CO3 L M S L M M S L S M
CO4 S M L M L L M M M S
CO5 M S S S S S M L M S
S-Strong M-Medium L-Low
Course Outcomes • Learn about the Basic concepts of Life cycle models.
• Understand the Use-case models to design diagrams.
• Familiarize the use of Rational Rose Software to develop the diagrams.
• Apply the tools to develop and test the real time design applications.
• Create the UML Diagrams
Course I ELECTIVE K1 & K2
Course Code MSI E407
Title of the Object Oriented Analysis and Design
Course:
Credits: L-T-P-C 3-0-0-3
Pre-requisites Students should know about the Object-oriented programming concepts of C++
or java and UML diagrams.
Course The main objectives of this course are to:
Objectives • Study the Life cycle Models with framework. (K1 & K2)
• Know the in-depth knowledge of UML diagrams. (K2 &K3)
• Understand the UML Diagrams to apply real time Use cases to implement
real time projects. (K4 & K5)
• To apply the concepts in business environment. (K5 & K6)
• Create the UML designs to develop applications. (K5 & K6)
K1 - Recall; K2 - Understand; K3 - Apply; K4 - Analyze; K5 - Evaluate; K6 - Create
UNITS
Unit I LIFE CYCLE MODELS 10 hours
System Development - Object Basics - Development Life Cycle - Methodologies - Patterns -
Frameworks - Unified Approach - UML.
Unit II USE-CASE MODELS 10 hours
Use-Case Models - Object Analysis - Object relations - Attributes - Methods – Class and Object
responsibilities - Case Studies.
Unit III DESIGN PROCESSES 10 hours
Design Processes - Design Axioms - Class Design - Object Storage - Object Interoperability - Case
Studies.
Unit IV USER INTERFACE DESIGN 5 hours
Understanding how to search/Google bookmarking and Going to a specific website- Copy and paste
Internet content into your word file and emails- Understanding social media platforms such as Face
book- & Many more learn with best practices.
Unit V TESTING 5 hours
Quality Assurance Tests - Testing Strategies - Object orientation on testing - Test Cases - test Plans -
Continuous testing - Debugging Principles - System Usability - Measuring User Satisfaction - Case
Studies.
Unit V CASE STUDIES 5 hours
Design and Implement a Complete Project with reference to UML syllabus and online content-Team
wise.
Total Lecture hours 45 hours
Related Online Contents [MOOC, SWAYAM, NPTEL, Websites etc.]
1. [Link]
2. [Link]
Course Designed By: [Link]. Chithra
Method of Evaluation:
Sessional I Sessional II End Semester Total Grade
Examination
20- (Section A 20- (Section A 60- (Section A K1- 100 As per
K1-5 – answer all K1-5 – answer all 5 – answer all – UNOM
- each1 mark & - each1 mark & each 2 mark & guidelines
Section B K2, K3, Section B K2, K3, Section B K2, K3,
K4, K5 – any 3/5 K4, K5 – any 3/5 K4, K5 – internal
choice from each
each 5 marks ) each 5 marks ) unit -- each 10
marks )
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10
CO 1 M S M S M S M M L S
CO 2 S S L S S M L M S S
CO 3 S M S S S M L S S S
CO 4 S S S S S S M S S S
CO 5 M S M S M S M M L S
*S-Strong M-Medium L-Low
Course ● 1 Learn and recall allied level mathematics for application problems.
Outcomes
● 2 To understand the role of linear algebra and matrix in computer science
problem solving.
● 3 Learn and understand unit step function and Dirac delta function. To
study orthogonal functions and Fourier transforms and understand their
use in computational problems.
● 4 Learn the concepts of number theory for cryptography.
● 5 Critically analyze and implement programs for the methods studied
for a set of selected example problems..
Course Code MSIC421/Core
Units
I Set theory: Operations on sets – Basic set identities – Relations and orderings – Functions -6 Hrs
II Linear algebra Part I: Linear vector spaces - Linear operators – vectors in n-dimensions – matrix
representation of vectors and operators in a basis – linear independence, dimension – inner
product – Orthonormal basis –Eigenvalues and eigenfunctions of operators/matrices – Eigen
basis, Diagonalizing matrix – Quadratic forms – Complex matrices and forms - Hermitian and
Unitary operators/matrices. 12 Hrs
III Linear algebra Part II: Cayley-Hamilton Theorem - Gram-Schmidt process –Eigen values
using QR transformations – QR factorization - generalized eigenvectors –– singular value
decomposition and applications - pseudo inverse – least square approximations -Toeplitz
matrices and some applications. 10 Hrs
IV Laplace Transforms : Solution of linear differential equations with constant coefficients- – Unit
step function and Dirac delta function. Sturm-Liouville theory: Second order linear differential
equations . Strum-Liouville theory: Orthogonality of eigenfunctions – Illustration with
Legendre, Laguerre, Hermite, Chebyshev differential equations - expansion of polynomials.
Fourier Transforms: Fourier sine and cosine transforms – Fourier transform - convolution
theorem - Discrete Fourier transform and Fast Fourier transform. 12 Hrs
V Number Theory: Modular arithmetic - Fermat’s and Euler’s theorem – Testing for primality -
Chinese remainder theorem – Discrete logarithms – Groups – Rings – Fields - Finite fields –
GF(p) - Polynomial arithmetic – Finite fields of the form GF(2n). 8 Hrs
● 3 [Link]
● 4 [Link]
Recomm 5. J P Tremblay and R Manohar, Discrete Mathematical Structures with Applications to
ended Computer Science, International Edition (McGraw-Hill, Singapore, 1987; Tata
Texts McGraw-Hill, New Delhi, 1997).
th
6. E Kreyszig, Advanced Engineering Mathematics, 10 Edition (Wiley, NY, 2011).
7. M D Greenberg, Advanced Engineering Mathematics, 2nd Edition, Prentice-Hall 1998.
8. R. Bronson, G. [Link], “Linear Algebra”, 2nd Ed., Academic Press, 2007.
5. R. Bronson, “Matrix Operation”, Schaum‟s Outline Series, 2nd Ed., McGraw Hill, 2011.
6. G. James, “Advanced Modern Engineering Mathematics”, 3rd edition, Pearson/Prentice
Hall, 2004.
7. P. V.O'Neil, “Advanced Engineering Mathematics” , 7th Ed., Cengage Learning, 2011.
8. W. Stallings, Cryptography and Network Security Principles and Practice, 7th
edition, Pearson Education, 2017.
9. D. R. Stinson and M. B. Paterson, Cryptography Theory and Practice, 4th
Edition, CRC Press 2019.
10. Hans Delfs , and Helmut Knebl, Introduction to Cryptography Principles and
Applications, 3rd Edition, 2015 Springer.
Course designed by Prof. P. Thangavel
Method of Evaluation:
Sessional I Sessional II End Semester Total Grade
Examination
20 20 60 100 As per
University’s
K1, K2, K4 &K5 K1, K2, K3, K4 K1, K2, K3, K4
common
& K6 K5 & K6
systems
Methods of assessment: (As per common pattern.) Recall (K1), Understand/ Comprehend
(K2), Application (K3), Analyse (K4), Evaluate (K5), Create (K6)
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10
CO 1 M S M S M S L M L M
CO 2 S S L S S M L M L L
CO 3 S M S S S M L S M L
CO 4 S S S S S S M S L L
CO 5 M S S M M L S L L L
S-Strong M-Medium L-Low
Method of Evaluation:
Sessional I Sessional II End Semester Total Grade
Examination
20- (Section A 20- (Section A 60- (Section A K1- 100 As per
K1-5 – answer all K1-5 – answer all 5 – answer all – UNOM
- each1 mark & - each1 mark & each 2 mark & guidelines
Section B K2, K3, Section B K2, K3, Section B K2, K3,
K4, K5 – any 3/5 K4, K5 – any 3/5 K4, K5 – internal
each 5 marks ) each 5 marks ) choice from each
unit -- each 10
marks )
CO 1 M S S M S S M M S L
CO 2 M S M M M S L L S S
CO 3 M M S M M S M L S S
CO 4 M M S M M M M S S S
CO 5 S S S S M S S S S S