semester 7 period: august 2019 november 2019 - rajagiri school of engineering & technology ·...

106
SEMESTER 7 PERIOD: August 2019 November 2019

Upload: others

Post on 13-Mar-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

SEMESTER 7

PERIOD: August 2019 –

November 2019

Sl. No Page No

1 Assignment Schedule for S7 IT 5

2 IT 301 –Embedded System 9

2.1 Course Information Sheets 10

2.2 Course Plan 15

3 IT 303 : Internetworking with TCP/IP 17

3.1 Course Information Sheets 18

3.2 Course Plan 21

3.3 Assignment 24

4 IT 409: Web Application development 25

4.1 Course Information Sheets 26

4.2 Course Plan 31

4.3 Assignment 33

5 IT 407:Knowledge Engineering 34

5.1 Course Information Sheets 35

5.2 Course Plan 41

5.3 Assignment 43

5.4 Tutorial 51

6 CS 467 Machine learning 52

6.1 Course Information Sheets 53

6.2 Course Plan 60

6.3 Assignment 63

7 IT 467 : Cyber Forensics 65

7.1 Course Information Sheets 66

7.2 Course Plan 68

7.3 Assignment 72

8 IT 403: Mobile Computing 73

8.1 Course Information Sheets 74

8.2 Course Plan 80

8.3 Assignment 82

9 IT451: Seminar 84

9.1 Course Information Sheets 85

9.2 Project PreliminaryGuidelines 89

10 IT431 Web Application development Lab 97

10.1 Course Information Sheets 98

10.2 Lab cycle 103

ASSIGNMENT SCHEDULE FOR S7 IT

Week Subject Subject Teacher

Week 1

Embedded System

Binu A

Week 3

Internetworking

Abey Abrham

Week 5 Web application and Design Nikhila T Bhuvan

Week 7 Mobile computing Bency Wilson

Week 9 ELECTIVE 1 Sherly k k/Mathews

Abrham

Prepared By Approved By

BENCY WILSON Saritha s

HoD

Program Outcomes (PO)

Information Technology Program Students will be able to:

PO 1.Engineering knowledge: Apply the knowledge of mathematics, science,

engineering

fundamentals, and an engineering specialization to the solution of complex engineering

problems.

PO 2.Problem analysis: Identify, formulate, review research literature, and analyze

complex engineering problems reaching substantiated conclusions using first

principles of mathematics, natural sciences, and engineering sciences.

PO 3.Design/development of solutions: Design solutions for complex engineering

problems and design system components or processes that meet the specified needs

with appropriate consideration for the public health and safety, and the cultural,

societal, and environmental considerations.

PO 4.Conduct investigations of complex problems: Use research-based knowledge and

research methods including design of experiments, analysis and interpretation of data,

and synthesis of the information to provide valid conclusions.

PO 5.Modern tool usage: Create, select, and apply appropriate techniques, resources,

and modern engineering and IT tools including prediction and modeling to complex

engineering activities with an understanding of the limitations.

PO 6.The engineer and society: Apply reasoning informed by the contextual knowledge

to assess societal, health, safety, legal and cultural issues and the consequent

responsibilities relevant to the professional engineering practice.

PO 7.Environment and sustainability: Understand the impact of the professional

engineering solutions in societal and environmental contexts, and demonstrate the

knowledge of, and need for sustainable development.

PO 8.Ethics: Apply ethical principles and commit to professional ethics and

responsibilities and norms of the engineering practice.

PO 9.Individual and team work: Function effectively as an individual, and as a member

or leader in diverse teams, and in multidisciplinary settings.

PO 10.Communication: Communicate effectively on complex engineering activities

with the engineering community and with society at large, such as, being able to

comprehend and write effective reports and design documentation, make effective

presentations, and give and receive clear instructions.

PO 11.Project management and finance: Demonstrate knowledge and understanding of

the engineering and management principles and apply these to one’s own work, as a

member and leader in a team, to manage projects and in multidisciplinary

environments.

PO 12. Life-long learning: Recognize the need for, and have the preparation and ability

to engage in independent and life-long learning in the broadest context of

technological change.

Program Specific Outcomes (PSO)

Information Technology Program Students will be able to:

PSO1: Acquire skills to design, analyse and develop algorithms and implement those

using high-level programming languages.

PSO2: Contribute their engineering skills in computing and information engineering

domains like network design and administration, database design and knowledge

engineering.

PSO3: Develop strong skills in systematic planning, developing, testing, implementing

and providing IT solutions for different domains which helps in the betterment of life.

Program Educational Objectives (PEO)

Graduates of Information Technology program shall

PEO 1: Have strong technical foundation for successful professional careers and to

evolve as key-players/ entrepreneurs in the field of information technology.

PEO 2: Excel in analyzing, formulating and solving engineering problems to promote

life-long learning, to develop applications, resulting in the betterment of the society.

PEO 3: Have leadership skills and awareness on professional ethics and codes.

IT 301

Embedded System

COURSE INFORMATION SHEET 2019

PROGRAMME: INFORMATION DEGREE: BTECH

TECHNOLOGY

COURSE: EMBEDDED SYSTEMS SEMESTER: 7 CREDITS: 4

COURSE CODE: IT401 REGULATION: COURSE TYPE: CORE

COURSE AREA/DOMAIN: COMPUTER CONTACT HOURS: 4+0 (Tutorial)

SCIENCE/IT hours/Week.

CORRESPONDING LAB COURSE CODE (IF LAB COURSE NAME:NIL

ANY):NIL

SYLLABUS:

Unit Details Hours

1 Introduction to Embedded Systems, Embedded Systems – TheHardware

Point of View: Microcontroller Unit, 8 bit MCU,Memory for Embedded

System, Low Power DesignSensors, ADCs and Actuators-Temperature

Sensors, LightSensors, Range Sensors, Humidity Sensors, Other

Sensors,Analog to Digital Converters, Actuators.

8

2 Examples of Embedded Systems – Mobile Phone,Automotive

Electronics, RFID, Wireless Sensor Networks,Robotics, Biomedical

Applications, Brain Machine Interface,Buses and Protocols – Defining

Buses and Protocols, On-

board buses for Embedded Systems, External Buses,Automotive

Buses

8

3 Raspberry Pi – Introduction, Python and Raspberry Pi,Arduino and

Raspberry Pi, Basic Input and Output

9

4 Embedded Sytem Design Techniques – DesignMethodologies, Requirements

Analysis, Specifications, SystemAnalysis and Architecture Design, Quality

Assurance, DesignExamples

9

5 Arduino – Introduction, ArduinoInteraction of Arduino board With 10

Computers and OtherDevices, Programming with Arduino

6 Software Development Tools, Real Time Operating Systems – Operating

Systems, SchedulingCommunication Mechanisms, Power Optimization

Strategiesfor ProcessesARM Processor- Processor and Memory

Organization, DataOperations, Flow of Control

10

Text Books

1. Lyla B Das, “Embedded Systems : An Integrated Approach”, Pearson Education, 2013

2. Matt Richardson, Shawn Wallace, “Getting Started With Raspberry Pi”, O'Reilly, 2013

3. Michael Margolis,”Arduino Cookbook”, O'Reilly, 2011

4. Peter Barry, Patrick Crowley, “Modern Embedded Computing”, Morgan Kaufmann

5. Wayne Wolf, “Computers as Components : Principles of Embedded Computing System Design”,

Elsevier

COURSE PRE-REQUISITES: NIL

Course Objectives

To understand the fundamental concepts in Embedded Systems, Real Time Operating Systems,

Arduino and Raspberry Pi

To impart Embedded System Design Techniques

Expected Outcome

The students will be able to

The students will acquire conceptual understanding in embedded systems, , , and the ability to apply

them in practical situations.

No Description Blooms

Taxonomy

Level

1 Acquire conceptual understanding in embedded systems Knowledge

(level 1)

2

Real time operating systems Understand,

Analyze(level

2 and 4)

3

Arduino Understand,

Analyze(level

2 and 4)

4 Raspberry Pi Understand

(level 2)

CO-PO/PSO Mapping

PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO PSO

1 2 3 4 5 6 7 8 9 10 11 12 1 2 3

CO1 3 3 3 3 2

CO2 2 2 2

CO3 3 2

CO4 3 2

JUSTIFICATIONS FOR CO-PO MAPPING

MAPPING LOW/MEDIUM/HIGH JUSTIFICATION

CO1-PO1 H Acquire conceptual understanding in embedded

systems

CO1-PO3 H Acquire conceptual understanding in embedded

systems

CO1-PO5 H Acquire conceptual understanding in embedded

systems

CO1-PO12 H Acquire conceptual understanding in embedded

systems

CO1-PSO2 M Fundamentals ideas on Real Time OS

CO2-PO1 M Fundamentals ideas on Real Time OS

CO2-PO4 M Fundamentals ideas on Real Time OS

CO2-PO12 M Fundamentals ideas on Real Time OS

CO3-PO3 H Arduino Architecture

CO3-PO12 M Arduino Programming

CO4-PO3 H Raspberry Pi Architecture

CO4-PO12 M Raspberry Pi Programming

GAPS IN THE SYLLABUS - TO MEET INDUSTRY/PROFESSION REQUIREMENTS:

No Description Proposed Actions

1 Familiarization IoT Systems Topic Beyond Syllabus

2 Familiarization on safe conteki realtime OS Topic Beyond Syllabus

TOPICS BEYOND SYLLABUS/ADVANCED TOPICS/DESIGN:

1. Familiarization on IoT Baords

2. Familiarization on Safe Conteki OS

WEB SOURCE REFERENCES:

1. https://nptel.ac.in/courses/108102045/

2. https://nptel.ac.in/courses/106105159/

DELIVERY/INSTRUCTIONAL METHODOLOGIES:

☐ CHALK & TALK ☐ STUD. ☐ WEB

ASSIGNMENT RESOURCES

☐ LCD/SMART ☐ STUD. ☐ ADD-ON

BOARDS SEMINARS COURSES

ASSESSMENT METHODOLOGIES-DIRECT

☐ ASSIGNMENTS ☐ STUD. ☐ TESTS/MODEL ☐ UNIV.

SEMINARS EXAMS EXAMINATION

☐ STUD. LAB ☐ STUD. VIVA ☐ MINI/MAJOR ☐

PRACTICES PROJECTS CERTIFICATIONS

☐ ADD-ON ☐ OTHERS

COURSES

ASSESSMENT METHODOLOGIES-INDIRECT

☐ ASSESSMENT OF COURSE OUTCOMES ☐ STUDENT FEEDBACK ON

(BY FEEDBACK, ONCE) FACULTY (TWICE)

☐ ASSESSMENT OF MINI/MAJOR ☐ OTHERS

PROJECTS BY EXT. EXPERTS

Prepared by Approved by

Binu A

Prof. Saritha S

(HOD)

(Faculty)

COURSE PLAN

Lecture

No.

Module Topics

1 1 Introduction to Embedded Systems

2 1 Embedded Systems – The Hardware Point of View:

Microcontroller Unit

3 1 8 bit MCU

4 1 Memory for Embedded System

5 1 Low Power DesignSensors

6 1 ADCs and Actuators

7 1 Temperature Sensors, LightSensors, Range Sensors, Humidity

Sensors, Other Sensors

8 1 Temperature Sensors, LightSensors, Range Sensors, Humidity

Sensors, Other Sensors

9 1 Analog to Digital Converters, Actuators

10 2 Examples of Embedded Systems – Mobile Phone

11 2 Automotive Electronics

12 2 RFID

13 2 Wireless Sensor Networks

14 2 Robotics

15 2 Biomedical Applications

16 2 Brain Machine Interface

17 2 Buses and Protocols – Defining Buses and Protocols

18 2 On-board buses for Embedded Systems

19 2 External Buses,Automotive Buses

20 3 Raspberry Pi – Introduction

21 3 Python and Raspberry Pi

22 3 Python and Raspberry Pi

23 3 Arduino and Raspberry Pi

24 3 Arduino and Raspberry Pi

25 3 Basic Input and Output

26 3 Basic Input and Output

27 3 Raspberry Pi – Case Studies

28 3 Raspberry Pi – Case Studies

29 3 Raspberry Pi – Case Studies

30 4 Embedded System Design Techniques – DesignMethodologies

31 4 Requirements Analysis,Specifications

32 4 SystemAnalysis and Architecture Design

33 4 Quality Assurance

34 4 DesignExamples

35 4 Case Studies

36 4 Case Studies

37 4 Case Studies

38 4 Case Studies

39 5 Arduino – Introduction

40 5 ArduinoInteraction of Arduino board With Computers and

OtherDevices

41 5 Programming with Arduino

42 5 Programming with Arduino

43 5 Programming with Arduino

44 5 Programming with Arduino

45 5 Programming with Arduino

46 6 Software Development Tools, Real Time Operating Systems –

Operating Systems

47 6 SchedulingCommunication Mechanisms

48 6 Power Optimization Strategiesfor ProcessesARM Processor

49 6 Processor and Memory Organization

50 6 DataOperations

51 6 Flow of Control

52 Revision

53 Revision

54 Revision

55 Revision

IT303

Internetworking with

TCP/IP

COURSE INFORMATION SHEET – JULY 2019

PROGRAMME : Information Technology DEGREE : BTECH

COURSE : Internetworking with TCP/IP SEMESTER : VII

CREDITS : 3

COURSE CODE : IT405

REGULATION : 2016 COURSE TYPE : CORE

COURSE AREA/DOMAIN : Networking CONTACT HOURS : 3 hours/Week.

CORRESPONDING LAB COURSE CODE (IF ANY) : NA LAB COURSE NAME :

SYLLABUS:

UNIT DETAILS HOURS

I

Introduction and Overview, Overview Of Underlying Network Technologies,

Internetworking Concept And Architectural Model, Protocol Layering

Internet Addressing, Mapping Internet Addresses To Physical Addresses

(ARP), Internet Protocol: Connectionless Datagram Delivery (IPv4, Ipv6)

CIDR Sub netting

10

II

Internet Protocol: Forwarding IP Datagrams, Internet Protocol: Error And

Control Messages (ICMP), User Datagram Protocol (UDP) 4

III

Reliable Stream Transport Service (TCP)

Routing Architecture: Cores, Peers, And Algorithms, Routing Among

Autonomous Systems (BGP), Routing Within An

Autonomous System (RIP, RIPng, OSPF, IS-IS)

10

IV

Internet Multicasting , Label Switching, Flows, And MPLS, Packet

Classification 5

V

Mobility And Mobile IP, Network Virtualization: VPNs, NATs, And Overlays

Bootstrap And Auto configuration (DHCP, NDP, Ipv6-ND), Voice And Video

Over IP (RTP, RSVP, QoS)

7

VI Software Defined Networking (SDN, OpenFlow)

6

TOTAL HOURS 42

TEXT/REFERENCE BOOKS:

T/R BOOK TITLE/AUTHORS/PUBLICATION

R

Douglas E Comer, “Internetworking with TCP/IP Principles, Protocol, and Architecture” ,

Volume I, 6th Edition, Pearson Education, 2013

R William Stallings, “Data and Computer Communications”, 9th Edition, Pearson Education,

2011

COURSE PRE-REQUISITES:NIL

COURSE OBJECTIVES:

1

To understand the fundamental concepts in Internetworking, Internet Addressing, IP, UDP, and

TCP Protocols, Routing Architecture, Network Virtualization and Software Defined Networking

COURSE OUTCOMES:

SNO DESCRIPTION Blooms’ Taxonomy Level

IT405.1 Students will be able to define the basic concepts of

Internetworking architectures and Internet Addressing

Knowledge (level1)

IT405.2 Students will be able to distinguish and compare different

Internet Protocol

Understand (level 2)Evaluate (level 5)

IT405.3 Students will be able to determine and analyze various routing

technology to transport datagram between hosts using an

reliable, and best-effort service.

Apply (level 3)Analyze (level 4)

IT405.4 Students will be able to identify techniques for providing

multicasting over the Internet.

Knowledge

(level 1)

IT405.5 Students will be able to identify techniques for providing

mobility, Network Virtualization and Bootstrapping and Auto

Configuration over the Internet.

Knowledge

(level 1)

IT405.6 Students will be able to define basic concepts of software

Defined Networking

Knowledge

(level 1)

CO-PO AND CO-PSO MAPPING

PO

1

PO2 PO3 PO4 PO5 PO6 PO7 P

O

8

P

O

9

PO

10

PO

11

PO1

2

PSO

1

PSO

2

PSO

3

IT405.1 2

2

IT405.2 3 1

IT405.3 3 2 1 1

IT405.4 2 1 1

IT405.5 2 2

IT405.6 2 2

JUSTIFATIONS FOR CO-PO MAPPING

Mapping LOW/MEDIUM/HIGH Justification

IT 405.1 – PO1 M Apply the knowledge of basic concepts of the basic concepts

of Internetworking architectures and Internet Addressing

IT 405.1 – PS02 M Contribute in network design and administration..

IT405.2- PO2 H Identifying and analyzing different Internet protocols that can

be used in different categories of networks.

IT405.2-PS02 L Contribute in providing different Internet protocols in Internet

design.

IT405.3-P01 H Apply the knowledge of routing techniques in Internet.

IT 405.3-P03 M Design better routing technology to transport datagrams

between hosts in Internet using appropriate routing methods.

IT 405.3-P10 L Ability to opt the correct routing strategies and to end in

better solutions for community and society using Internet.

IT405.3-PSO2 L Contribute knowledge in routing protocols in designing

Network.

IT405.4-P01 M Able to apply the fundamentals of techniques for providing

multicasting and mobility over the Internet

IT 405.4-P03 L Designing solutions for multicasting over Internet.

IT 405.4-PSO3 M Develop strong skills in understanding, developing and

testing new concepts in Internet protocols.

IT405.5-P01 M Apply the knowledge for providing mobility, Network

Virtualization and Bootstrapping and Auto Configuration

over the Internet.

IT 405.4-PSO2 M Contribute knowledge in application services and protocols in

designing proper networks in different scenarios.

IT405.6-PO1 M Apply the knowledge for providing basic concepts of

software Defined Networking and openflow software

IT405.6-PSO2 M Contribute knowledge in software Defined Networking in

designing proper networks in different scenarios.

GAPS IN THE SYLLABUS - TO MEET INDUSTRY/PROFESSION REQUIREMENTS:

SNO DESCRIPTION PROPOSED ACTIONS

1 Introduction to Network Security TOPICS BEYOND SYLLABUS

PROPOSED ACTIONS: TOPICS BEYOND SYLLABUS/ASSIGNMENT/INDUSTRY VISIT/GUEST LECTURER/NPTEL ETC

TOPICS BEYOND SYLLABUS/ADVANCED TOPICS/DESIGN:

1 Introduction to Network Security

WEB SOURCE REFERENCES:

1 http://www.netbook.cs.purdue.edu/

2 http://cs.calvin.edu/

3 www.cisco.com/networkers/

4 http://nptel.iitm.ac.in/video.php?subjectId=106105084

5 www.ee.duke.edu/~romit/courses/f07/material/

6 www.csperkins.org/teaching/ns3/

7 www.javvin.com/protocol/

8 https://users.cs.jmu.edu

9 http://docwiki.cisco.com/wiki/Internetworking_Basics

10 www.ulb.tu-darmstadt.de/tocs/134991974.pdf

DELIVERY/INSTRUCTIONAL METHODOLOGIES:

CHALK & TALK STUD.

ASSIGNMENT

WEB

RESOURCES

LCD/SMART

BOARDS STUD. SEMINARS

ADD-ON

COURSES

ASSESSMENT METHODOLOGIES-DIRECT

ASSIGNMENTS STUD.

SEMINARS

TESTS/MODEL

EXAMS UNIV. EXAMINATION

STUD. LAB

PRACTICES ☐ STUD. VIVA ☐ MINI/MAJOR PROJECTS ☐ CERTIFICATIONS

☐ ADD-ON COURSES ☐ OTHERS

ASSESSMENT METHODOLOGIES-INDIRECT

ASSESSMENT OF COURSE OUTCOMES (BY FEEDBACK,

ONCE)

STUDENT FEEDBACK ON FACULTY

(TWICE)

☐ ASSESSMENT OF MINI/MAJOR PROJECTS BY EXT. EXPERTS ☐ OTHERS

Prepared by Approved by

Abey Abraham HOD

IT405-Internetworking with TCP/IP

Course Plan -2019

Sl.No Module Planned

1

Module 1

Introduction and Overview

2 Overview Of Underlying Network Technologies

3 Internetworking Concept And Architectural Model, Protocol

Layering Internet Addressing, Mapping Internet Addresses To

Physical Addresses (ARP)

4 Internet Protocol: Connectionless Datagram Delivery (IPv4, Ipv6)

5 CIDR Sub netting

6 CIDR Sub netting

7

Module 2

Internet Protocol: Forwarding IP Datagrams

8 Internet Protocol: Error And Control Messages (ICMP)

9 User Datagram Protocol (UDP)

10

Module 3

Reliable Stream Transport Service (TCP)

11 Reliable Stream Transport Service (TCP)

12 Routing Architecture: Cores, Peers, And Algorithms

13 Routing Among Autonomous Systems (BGP),Routing Within An

Autonomous System (RIP, RIPng)

14 OSPF, IS-IS

15

Module 4

Internet Multicasting

16 Internet Multicasting

17 Label Switching, Flows, And MPLS

18 Packet Classification

19 Packet Classification

20

Module 5

Mobility And Mobile IP

21 Network Virtualization: VPNs, NATs,Overlays

22 Bootstrap And Auto configuration (DHCP, NDP, Ipv6-ND)

23 Voice And Video Over IP (RTP, RSVP, QoS)

24 Revision

25 Revision

26 Revision

27

Module 6

Software Defined Networking

28 Software Defined Networking

29 Software Defined Networking

30 OpenFlow

RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY

Department of Information Technology

IT405: INTERNETWORKING WITH TCP/IP

ASSIGNMENT QUESTIONS – JULY –DEC2019

Assignment – I(4th

September 2019)

1. Explain about different network technologies.

Assignment – II(10th

October 2019)

1. Voice And Video Over IP (RTP, RSVP, QoS)

IT 409

WEB APPLICATION

DEVELOPMENT

COURSE INFORMATION SHEET

PROGRAMME: INFORMATION TECHNOLOGY DEGREE: BTECH

COURSE: WEB APPLICATION DEVELOPMENT

SEMESTER: VII CREDITS: 3

COURSE CODE: IT409

REGULATION: 2016

COURSE TYPE: CORE

COURSE AREA/DOMAIN: WEB DESIGNING CONTACT HOURS: 3 hours/Week.

CORRESPONDING LAB COURSE CODE (IF ANY):

IT431

LAB COURSE NAME:WEB APPLICATION

DEVELOPMENT LAB

SYLLABUS:

UNIT DETAILS HOURS

I Introduction - Web architecture - web application lifecycle - XML and J2EE

Servlets: Introduction to Servlets, Benefits of Servlets, use as controller in MVC, basic HTTP,

servlet container, Servlets API, javax.servelet Package, Reading Servlet parameters, service

method detail. HTML clients, servlet lifecycle

7

II Session management, dispatching requests, Servlets with JDBC, JDBC: Architecture - JDBC API 7

III Java Server Pages: Generating Dynamic Content, Using Scripting Elements, Implicit JSP Objects.

Conditional Processing – Displaying Values, Setting attributes, Error Handling and Debugging,

Using JavaBeans Components in JSP Pages.

6

IV Passing Control and Data between Pages – Sharing Session and Application Data – Application

Models - MVC Design

6

V Enterprise JavaBeans : Overview, distributed programming, EJB framework, Session and entity

beans, Stateless and stateful session bean, Bean attributes, Parts of a Bean. Container-Managed

Persistence (CMP) and bean managed persistence.

8

VI Lifecycle of EJB, Java message service (JMS) and message driven beans (MDB), distributed

programming services, CORBA and RMI - Transaction management, Security,

deployment, building session beans - creating session beans - Entity beans.

8

TOTAL HOURS 42

TEXT/REFERENCE BOOKS:

T/R BOOK TITLE/AUTHORS/PUBLICATION

R

R

R

R

J2EEUNLEASHED–JosephJ.Bambara,PaulR.Allen,MarkAshnault,ZiyadDean,Thomas Garben, SherrySmith–

SAMS Techmedia

JavaServlet Programming, SecondEdition,JasonHunter, WilliamCrawford,O'ReillyMedia

MasteringEJB(2ndEdition)–EdRoman,ScottAmbler,TylerJewell–JohnWileyPublications 2003.

TheJ2EETutorial-StepahnieBodoff,DaleGreen,KimHasse,EricJendrock, MonicaPawlan, Beth Stearns-

R

TheJ2EETutorial –Asia.

JavaServerPages–HansBergsten, SPDO’Reilly

COURSE PRE-REQUISITES:

C.CODE COURSE NAME DESCRIPTION SEM

IT 302 Internet Technology Basics of Web applications S6

COURSE OBJECTIVES:

To give insights of the Internet programming for designing and implementation

To develop code to handle exceptions and validate data for file and database storage.

To know usage of recent platforms used in developing web applications such as J2EE, XML ...etc.

To impart the idea about java beans.

COURSE OUTCOMES:

SlNO DESCRIPTION Blooms’ Taxonomy Level

C409.1 Students will be able to define the web architecture and summarize task list

for building J2EE Applications.

Knowledge , Evaluate

(level1 and level 5)

C409.2 Students will be able to demonstrate and develop the applications with JDBC

and servlets

Understand, Create (level2

and level 6)

C409.3 Students will be able to explain and analyze applications with Java Server

Pages.

Apply, Analyze (level 3

and level 4)

C409.4 Students will be able to and implement and evaluate applications with

Enterprise JavaBeans

Evaluate (level 5 )

C409.5 Students will be able to explain distributed programming services Understand

(level 2)

CO-PO AND CO-PSO MAPPING

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3

C409.1 2 2 2 2 _ _ _ _ _ _ _ _ 1 _

C409.2 2 1 3 3 _ _ _ _ _ _ _ _ 2 3 _

C409.3 2 2 3 3 _ _ _ _ _ _ _ _ 2 3 _

C409.4 2 2 1 1 _ _ _ _ _ _ _ _ 1 2

C409.5 1 2 1 1 _ _ _ _ _ _ _ _ _ _ _

C409 2 2 2 2 _ _ _ _ _ _ _ _ - 1

JUSTIFICATIONS FOR CO-PO MAPPING

MAPPING LOW/

MEDIUM

JUSTIFICATION

/ HIGH

C409.1-PO1 M Apply the knowledge of web architecture to develop the solution of complex engineering

problems.

C409.1-PO2 M Analyze complex engineering problems by building J2EE Applications.

C409.1-PO3 M Design solutions for complex engineering problems by developing J2EE Applications.

C409.1-PO4 M Design of experiments with the knowledge in web architecture and J2EE.

C409.1-PSO1 L Build a strong technical foundation by building J2EE Applications.

C409.2-PO1 M Using JDBC and servlets build solution of complex engineering problems.

C409.2-PO2 L Using JDBC and servlets formulate complex engineering problems

C409.2-PO3 H Using JDBC and servlets design solutions for complex engineering problems and design

system components

C409.2-PO4 H Using JDBC and servlets design experiments, analyze and interpret data, and synthesize

information to provide valid conclusions.

C409.2-PSO1 M Using JDBC and servlets build technical foundation for successful professional careers and

to evolve as key-players/ entrepreneurs in the field of information technology.

C409.2-PSO2 H Using JDBC and servlets Excel in analyzing, formulating and solving engineering

problems

C409.3-PO1 M With the analysis of JSP applications develop the solution of complex engineering

problems.

C409.3-PO2 M With the analysis of JSP applications Analyze complex engineering problems

C409.3-PO3 H With the analysis of JSP applications Design solutions for complex engineering problems

and design system components

C409.3-PO4 H With the analysis of JSP applicationsdesign experiments, analyze and interpret data, and

synthesize information to provide valid conclusions.

C409.3-PSO1 M With the analysis of JSP applications build technical foundation for successful professional

careers and to evolve as key-players/ entrepreneurs in the field of information technology.

C409.3-PSO2 H With the analysis of JSP applications Excel in analyzing, formulating and solving

engineering problems

C409.4-PO1 M Apply the knowledge of JavaBeans to develop the solution of complex engineering

problems.

C409.4-PO2 M Analyze complex engineering problems by using JavaBeans

C409.4-PO3 L Design solutions for complex engineering problems by developing JavaBeans Applications.

C409.4-PO4 L Design of experiments with the knowledge in JavaBeans.

C409.5-PO1 M With the analysis of distributed programming develop the solution of complex engineering

problems.

C409.5-PO2 M With the analysis of distributed programming Analyze complex engineering problems

C409.5-PO3 M With the analysis of distributed programming Design solutions for complex engineering

problems and design system components

C409.5-PO4 M With the analysis of distributed programming design experiments, analyze and interpret

data, and synthesize information to provide valid conclusions.

C409.1-PSO2 M With the analysis of distributed programming Excel in analyzing, formulating and solving

engineering problems

GAPS IN THE SYLLABUS - TO MEET INDUSTRY/PROFESSION REQUIREMENTS:

Sl.

No.

DESCRIPTION PROPOSED

ACTIONS

RELEVANCE

WITH POs

RELEVANCE

WITH PSOs

1 HTML Programming Tutorial 1,2,3,4,12 2

2 XML Programming Tutorial 1,2,3,4,12 2

PROPOSED ACTIONS: TOPICS BEYOND SYLLABUS/ASSIGNMENT/INDUSTRY VISIT/GUEST

LECTURER/NPTEL ETC

TOPICS BEYOND SYLLABUS/ADVANCED TOPICS/DESIGN:

Sl.No DESCRIPTION PROPOSED

ACTIONS

RELEVANCE WITH POs RELEVANCE WITH

PSOs

1 Java Script Extra class 1,2,3,4,12 2

WEB SOURCE REFERENCES:

1 http://www.idt.mdh.se/kurser/cd5480/2003/lectures/j2ee1_3tutorial.pdf

2 http://docs.oracle.com/javase/tutorial/jdbc/overview/architecture.html

3 http://www.tutorialspoint.com/jdbc/jdbc-introduction.htm

4 http://www.cse.ohio-state.edu/~rountev/421/lectures/lecture23.pdf

5 http://www.apl.jhu.edu/~hall/java/Servlet-Tutorial/Servlet-Tutorial-JSP.html

6 http://portal.aauj.edu/portal_resources/downloads/programming/enterprise_java_beans_developers_guide.pdf

7 http://www.cs.wustl.edu/~schmidt/corba-overview.html

8 http://www.trainingetc.com/PDF/TE2403eval.pdf

DELIVERY/INSTRUCTIONAL METHODOLOGIES:

1. CHALK & TALK 2. STUD. ASSIGNMENT 3. WEB

RESOURCES

4. LCD/SMART BOARDS 4. STUD. SEMINARS ☐ ADD-ON COURSES

ASSESSMENT METHODOLOGIES-DIRECT

ASSIGNMEN

TS

STUD.

SEMINARS

TESTS/MODEL

EXAMS

UNIV.

EXAMINATION

STUD. LAB

PRACTICES

STUD. VIVA ☐ MINI/MAJOR

PROJECTS

☐ CERTIFICATIONS

☐ ADD-ON

COURSES

☐ OTHERS

ASSESSMENT METHODOLOGIES-INDIRECT

ASSESSMENT OF COURSE OUTCOMES

(BY FEEDBACK, ONCE)

STUDENT FEEDBACK ON

FACULTY (TWICE)

☐ ASSESSMENT OF MINI/MAJOR

PROJECTS BY EXT. EXPERTS

☐ OTHERS

Prepared by Approved by

Nikhila T Bhuvan

(HOD)

Rajagiri School of Engineering & Technology 2019S7IT

IT409:Web Application Development

Course Plan

Sl.No

Module Planned Date Planned

1 1 14-Aug-19 Introduction - Web architecture - web application lifecycle -

2 1 19-Aug-19 XML and J2EE.

3 1 19-Aug-19 Servlets: Introduction to Servlets, Benefits of Servlets,

4 1 21-Aug-19 Servlets API, javax.servelet Package,

5 1 26-Aug-19 Reading Servlet parameters, service method detail.

6 1 26-Aug-19 HTML clients, servlet lifecycle

7 2 28-Aug-19 Session management, dispatching requests,

8 2 2-Sep-19 Servlets with JDBC,

9 2 2-Sep-19 Servlets with JDBC,

10 2 4-Sep-19 JDBC: Architecture - JDBC API

11 2 6-Sep-19 JDBC: Architecture - JDBC API

12 3 23-Sep-19 Java Server Pages: Generating Dynamic Content

13 3 23-Sep-19 Using Scripting Elements, Implicit JSP Objects.

14 3 25-Sep-19 Conditional Processing – Displaying Values, Setting attributes,

Error Handling and Debugging,

15 3 27-Sep-19 Conditional Processing – Displaying Values, Setting attributes,

Error Handling and Debugging,

16 3 30-Sep-19 Using JavaBeans Components in JSP Pages.

17 4 30-Sep-19 Passing Control and Data between Pages

18 4 4-Oct-19 Sharing Session and Application Data

19 4 7-Oct-19 Application Models - MVC Design

20 4 7-Oct-19 Application Models - MVC Design

21 5 9-Oct-19 Enterprise JavaBeans : Overview, distributed programming

22 5 11-Oct-19 EJB framework

23 5 14-Oct-19 Session and entity beans

24 5 14-Oct-19 Stateless and stateful session bean,

25 5 16-Oct-19 Bean attributes,

26 5 21-Oct-19 Parts of a Bean. Container-Managed Persistence (CMP) and bean

managed persistence.

27 5 23-Oct-19 Parts of a Bean. Container-Managed Persistence (CMP) and bean

managed persistence.

28 5 28-Oct-19 stateful and staeless beans

29 6 11-Nov-19 life cycle of EJB

30 6 11-Nov-19 lifecycle of EJB

31 6 15-Nov-19 Message Driven Beans

32 6 13-Nov-19 Java Message Service (JMS)

33 6 18-Nov-19 Distributed Programming services Corba and RMI

35 6 20-Nov-19 Transaction Management

36 6 22-Nov-19 Security Deployment

37 6 25-Nov-19 Building Session Beans

38 6 25-Nov-19 Creating Session Beans and Entity Beans

Assignment Questions

Assignment 1-Submission date 17th

September 2019

1. Write down a servlet to post the name, phone number and address using post method and update the

database.

2. Write notes on HTTP Request Header and HTTP Request Header and methods associated with it.

Assignment 2-Submission date 16th

October 2019

1. Transaction management using EJB

IT 407

Knowledge Engineering

COURSE INFORMATION SHEET

PROGRAMME: BTECH- INFORMATION

TECHNOLOGY

DEGREE: BTECH

COURSE: KNOWLEDGE ENGINEERING SEMESTER: VII CREDITS: 3

COURSE CODE: IT407 REGULATION: 2016 COURSE TYPE: CORE

COURSE AREA/DOMAIN: KNOWLEDGE

ENGINEERING

CONTACT HOURS: 3 (Tutorial) hours/Week.

CORRESPONDING LAB COURSE CODE (IF

ANY): Nil

LAB COURSE NAME: Nil

SYLLABUS:

UNIT DETAILS HOURS

I

Problems and Search: What is Artificial Intelligence, The AI Problems, Defining the Problem

as a State Space Search, Problem Characteristics

Searching strategies – Generate and Test, Heuristic Search Techniques- Hill climbing– issues

in hill climbing.

Python-Introduction to Python- Lists Dictionaries & Tuples in Python- Python implementation

of Hill Climbing.

7

II

Search Methods - Best First Search - Implementation in Python - OR Graphs, The A *

Algorithm, Problem Reduction- AND-OR Graphs, The AO* algorithm, Constraint Satisfaction.

MINIMAX search procedure, Alpha–Beta pruning.

7

III

Knowledge representation - Using Predicate logic - representing facts in logic, functions and

predicates, Conversion to clause form, Resolution in propositional logic, Resolution in

predicate logic, Unification.

Representing Knowledge Using Rules: Procedural Versus Declarative knowledge, Logic

Programming, Forward versus Backward Reasoning.

7

IV Learning: What is learning, Rote learning, Learning by Taking Advice, Learning in Problem-

solving, Learning from example: induction, Explanation-based learning. 7

V Connectionist Models: Hopfield Networks, Learning in Neural Networks, Applications of

Neural Networks, Recurrent Networks. Connectionist AI and Symbolic AI 7

VI Expert System –Representing and using Domain Knowledge – Reasoning with knowledge–

Expert System Shells –Support for explanation- examples –Knowledge acquisition-examples.

7

TOTAL HOURS 42

TEXT/REFERENCE BOOKS:

T/R BOOK TITLE/AUTHORS/PUBLICATION

T Elaine Rich and Kevin Knight, “Artificial Intelligence”, Tata McGraw-Hill Publishing Company Ltd., New

Delhi, Third Edition, ISBN: 13:978-0-07-008770-5, 2010.

T Stuart Russell, Peter Norvig, “Artificial Intelligence- A modern approach”, Pearson Education Asia, Second

Edition, ISBN:81-297-0041-7

R Akshar Bharati, Vineet Chaitanya, Rajeev Sangal, “Natural Language Processing: A Paninian Perspective”,

Prentice Hall India Ltd., New Delhi, 1996, ISBN 10: 8120309219

R Amit Konar, Artificial Intelligence and Soft Computing, CRC Press.

R Dan W.Patterson, “Introduction to Artificial Intelligence and Expert Systems”, Prentice Hall India Ltd., New

Delhi, 2009, ISBN: 81-203-0777-1.

R Rajendra Akerkar, Introduction to Artificial Intelligence, PHI Learning Pvt. Ltd., 2005, ISBN: 81-203- 2864-

7.

COURSE PRE-REQUISITES:

C.CODE COURSE NAME DESCRIPTION SEM

CS205 Data Structures Various data structures 3

COURSE OBJECTIVES:

1 To get introduced to the basic knowledge representation, problem solving, and learning methods of Artificial

Intelligence.

2 To solve problems in Artificial Intelligence using Python.

3 To familiarize with knowledge processing in expert systems.

COURSE OUTCOMES:

CO-

PO

AN

D

CO-

PSO

MA

PPI

NG

PO

1

PO

2

PO

3

PO

4

PO

5

PO

6

PO

7

PO

8

PO

9

PO

10

PO

11

PO

12

PSO

1

PSO

2

PSO

3

C407.1 2 1 2 _ _ _ _ _ _ _ _ _ 2 _ _

C407.2 2 2 3 3 _ _ _ _ _ _ _ _ 2 2 _

C407.3 2 2 2 _ _ _ _ _ _ _ _ _ _ _

C407.4 2 2 2 _ _ _ _ _ _ _ _ _ 2

C407.5 2 - 2 2 _ _ _ _ _ _ _ _ _ _ _

C407 2 2 2 2 _ _ _ _ _ _ _ _ 2 2

JUSTIFICATIONS FOR CO-PO MAPPING

MAPPING LOW/MEDIUM/HIGH JUSTIFICATION

C407.1-PO1 M Knowledge about problem spaces helps to solve complex engineering

problems.

C407.1-PO2 L Learning fuzzy set and expert systems helps the students to build

solutions for complex engineering problems by developing simple

programs.

C407.1-PO3 M Knowledge about different search strategies enables the students to

design components or processes that meet specified needs.

C407.1-PSO1 M Acquire skills to design, analyse and develop algorithms

C407.2-PO1 M Learning python helps the students to build solutions for complex

engineering problems.

SNO DESCRIPTION Blooms’

Taxonomy

Level

C407.1 The students will know the fundamental concepts of Artificial Intelligence such as

knowledge representation, problem solving and expert systems.

Knowledge ,

Understand

(level 1 and

level2)

C407.2 The students will be able to implement search methods using Python. Apply (level 3 )

C407.3 Students will be able to summarize different learning methods used in artificial

intelligence.

Understand (

level2)

C407.4 Students will be able to compare different Connectionist Models

Analyze (level

4)

C407.5 Students will be able to develop new facts from existing knowledge base using

resolution and unification. Create (level 6)

C407.2-PO2 M Identify, formulate and analyze engineering problems.

C407.2-PO3 H Learning different search algorithms enables the students to contribute

their skills in knowledge engineering in design phase.

C407.2-PO4 H Design of experiments, analysis and interpretation of data, and

synthesis of the information can be achieved through implementing

algorithms using high-level programming languages

C407.2-PSO1 M Acquire skills to analyze and implement algorithms using high-level

programming languages

C407.2-PSO2 M Learning different search algorithms enables the students to contribute

their skills in knowledge engineering.

C407.3-PO1 M Knowledge about learning methods in artificial intelligence helps to

solve engineering problems.

C407.3-PO2 M Identify, formulate, and analyze complex problems reaching

substantiated conclusions by the application of learning techniques.

C407.3-PO3 M Learning techniques in AI helps in designing solutions for complex

engineering problems.

C407.4-PO1 M Knowledge about connectionist models spaces helps to solve complex

engineering problems.

C407.4-PO2 M Learning connectionist models helps the students to build solutions for

complex engineering problems by developing simple programs.

C407.4-PO3 M Knowledge about different connectionist models enables the students

to design components or processes that meet specified needs.

C407.4-PSO2 M Learning different connectionist models enables the students to

contribute their skills in knowledge engineering.

C407.5-PO1 M Knowledge about resolution helps to solve complex engineering

problems.

C407.5-PO3 M Learning unification and resolution helps the students to build solutions

for complex engineering problems by developing simple programs.

C805.4-PO4 M Design of experiments, analysis and interpretation of data, and

synthesis of the information can be achieved through unification and

resolution.

GAPS IN THE SYLLABUS - TO MEET INDUSTRY/PROFESSION REQUIREMENTS:

SNO DESCRIPTION PROPOSED

ACTIONS

1 Tools for Learning Artificial Intelligence - Graph Searching TOPICS BEYOND

SYLLABUS

PROPOSED ACTIONS: TOPICS BEYOND SYLLABUS/ASSIGNMENT/INDUSTRY VISIT/GUEST

LECTURER/NPTEL ETC

TOPICS BEYOND SYLLABUS/ADVANCED TOPICS/DESIGN:

1 Tools for Learning Artificial Intelligence - Graph Searching

WEB SOURCE REFERENCES:

1 http://code.google.com/p/aima-python/

2 http://www.aispace.org/mainTools.shtml

3 http://www.wiziq.com/tutorials/artificial-intelligence

4 http://courses.cs.vt.edu/csonline/AI/Lessons/index.html

5 http://nptel.ac.in/video.php?subjectId=106105077

DELIVERY/INSTRUCTIONAL METHODOLOGIES:

CHALK & TALK STUD.

ASSIGNMENT

WEB RESOURCES

☐ LCD/SMART

BOARDS

STUD. SEMINARS ☐ ADD-ON

COURSES

ASSESSMENT METHODOLOGIES-DIRECT

ASSIGNMENTS STUD. SEMINARS TESTS/MODEL

EXAMS

UNIV.

EXAMINATION

☐ STUD. LAB

PRACTICES

☐ STUD. VIVA ☐ MINI/MAJOR

PROJECTS

☐ CERTIFICATIONS

☐ ADD-ON

COURSES

☐ OTHERS

ASSESSMENT METHODOLOGIES-INDIRECT

☐ ASSESSMENT OF COURSE OUTCOMES (BY

FEEDBACK, ONCE)

STUDENT FEEDBACK ON FACULTY

(TWICE)

☐ ASSESSMENT OF MINI/MAJOR PROJECTS BY

EXT. EXPERTS

☐ OTHERS

Prepared by Approved by

Chinchu Krishna S Saritha S(HOD)

COURSE PLAN

Sl.No Module Planned

1 1 Defining the Problem as a State Space Search

2 1 Problem Characteristics

3 1 Searching strategies – Generate and Test

4 1 Heuristic Search Techniques- Hill climbing– issues in hill climbing

5 1 Python-Introduction to Python- Lists Dictionaries & Tuples in Python

6 1 Python implementation of Hill Climbing.

7 2 Best First Search - Implementation in Python

8 2 OR Graphs, The A * Algorithm

9 2 Problem Reduction- AND-OR Graphs

10 2 The AO* algorithm

11 2 Constraint Satisfaction

12 2 MINIMAX search procedure

13 2 Alpha–Beta pruning

14 3 Using Predicate logic

15 3 Representing facts in logic

16 3 Functions and predicates, Conversion to clause form

17 3 Resolution in propositional logic

18 3 Resolution in predicate logic, Unification.

19 3 Representing Knowledge Using Rules: Procedural Versus Declarative knowledge

20 3 Logic Programming

21 3 Forward Reasoning

22 3 Backward Reasoning

23 4 What is learning, Rote learning

24 4 Learning by Taking Advice

25 4 Learning in Problem-solving

26 4 Learning from example

27 4 induction

28 4 Explanation-based learning

29 5 Hopfield Networks

30 5 Learning in Neural Networks

31 5 Applications of Neural Networks

32 5 Recurrent Networks

33 5 Recurrent Networks

34 5 Connectionist AI

35 5 Connectionist AI

36 5 Symbolic AI

37 6 Expert System

38 6 Knowledge acquisition-examples.

39 6 Representing and using Domain Knowledge

40 6 Reasoning with knowledge

41 6 Reasoning with knowledge

42 6 Expert System Shells

43 6 Support for explanation- examples

44 6 Knowledge acquisition-examples.

45 6 Revision

ASSIGNMENT QUESTIONS

ASSIGNMENT NO:1

1. Perform A* search algorithm on the following figure

2. Perform Minimax algorithm with Alpha-Beta Pruning for the following figure

3. Perform Minimax algorithm with Alpha-Beta Pruning for the following figure

4. Perform Minimax algorithm with Alpha-Beta Pruning for the following figure

5. Perform Minimax algorithm with Alpha-Beta Pruning for the following figure

6. Perform Minimax algorithm with Alpha-Beta Pruning for the following figure

7. Perform Minimax algorithm with Alpha-Beta Pruning for the following figure

8. Perform Minimax algorithm with Alpha-Beta Pruning for the following figure

9. Perform Minimax algorithm with Alpha-Beta Pruning for the following figure

10. Perform Minimax algorithm with Alpha-Beta Pruning for the following figure

11. Perform Minimax algorithm with Alpha-Beta Pruning for the following figure

ASSIGNMENT NO:2

1. Apply resolution and answer the question “Did Marcus hate Caesar” using the given rules.

Hint: First convert to clause form and then convert to predicate logic and apply resolution

2. Apply forward chaining and answer the question “Did Marcus hate Caesar” using the given rules.

3. Apply backward chaining and answer the question “Did Marcus hate Caesar” using the given rules.

4. Consider the following sentences

5. Consider the following sentences

Prove that John like peanuts using forward chaining.

6. Apply resolution and prove Steve like Basketweaving course

Hint: First convert to clause form and then convert to predicate logic and apply resolution

7. Apply backward chaining and prove Steve like Basketweaving course

ASSIGNMENT NO:3

1. Apply forward chaining and prove Steve like Basketweaving course

2. Apply resolution and prove “Marcus not alive now”

3. Apply backward chaining and prove “Marcus not alive now”

4. Apply forward chaining and prove “Marcus not alive now”

5. Apply resolution and answer to the question “ When did Marcus die?”

6. What course would Steve like? Prove by resolution.

Steve only likes easy courses

Science courses are hard

All the courses in the basket weaving department are easy

BK301 is a basket weaving course

7. Prove Using Resolution

a. John likes peanuts.

b. Sue eats peanuts.

c. Sue eats apples.

TUTORIAL QUESTIONS

1. Apply unification for the given statements

2. Unify the following statements

( tryassassinate Marcus ,Caesar)

( tryassassinate Marcus ,(ruler of Rome)) 3. Unify the following statements

knows(john,X).

knows(X,elizabeth). 4. Write conversion to clause form with an example.

CS 467

Machine Learning

COURSE INFORMATION SHEET

PROGRAMME: Information Technology

DEGREE: BTECH

COURSE: Machine Learning SEMESTER: S7 CREDITS: 3

COURSE CODE: CS467

REGULATION: 2016

COURSE TYPE: ELECTIVE

COURSE AREA/DOMAIN: Artificial

Intelligence

CONTACT HOURS: 3hours/Week.

CORRESPONDING LAB COURSE CODE

(IF ANY):

LAB COURSE NAME:

SYLLABUS:

UNIT DETAILS HOURS

Introduction to Machine Learning, Learning in Artificial Neural Networks, Decision trees, HMM, SVM,

and other Supervised and Unsupervised learning methods.

1

Introduction to Machine Learning, Examples of Machine Learning applications -

Learning associations, Classification, Regression, Unsupervised Learning,

Reinforcement Learning. Supervised learning- Input representation, Hypothesis class,

Version space, Vapnik-Chervonenkis (VC) Dimension

6

2

Probably Approximately Learning (PAC), Noise, Learning Multiple classes, Model

Selection and Generalization, Dimensionality reduction- Subset selection, Principle

Component Analysis

8

3

Classification- Cross validation and re-sampling methods- Kfold cross validation, Boot

strapping, Measuring classifier performance- Precision, recall, ROC curves. Bayes

Theorem, Bayesian classifier, Maximum Likelihood estimation, Density functions,

Regression

8

4

Decision Trees- Entropy, Information Gain, Tree construction, ID3, Issues in Decision

Tree learning- Avoiding Over-fitting, Reduced Error Pruning, The problem of Missing

Attributes, Gain Ratio, Classification by Regression (CART), Neural Networks- The

Perceptron, Activation Functions, Training Feed Forward Network by Back Propagation.

6

5

Kernel Machines- Support Vector Machine- Optimal Separating hyper plane, Soft-

margin hyperplane, Kernel trick, Kernel functions. Discrete Markov Processes, Hidden

Markov models, Three basic problems of HMMs- Evaluation problem, finding state

sequence, Learning model parameters. Combining multiple learners, Ways to achieve

diversity, Model combination schemes, Voting, Bagging, Booting

8

6 Unsupervised Learning - Clustering Methods - K-means, Expectation-Maximization

Algorithm, Hierarchical Clustering Methods , Density based clustering 6

TOTAL HOURS 42

TEXT/REFERENCE BOOKS:

T/R BOOK TITLE/AUTHORS/PUBLICATION

R Christopher M. Bishop, Pattern Recognition and Machine Learning, Springer, 2006.

R EthemAlpaydın, Introduction to Machine Learning (Adaptive Computation and

Machine Learning), MIT Press, 2004.

R Margaret H. Dunham. Data Mining: introductory and Advanced Topics, Pearson,

2006

R Mitchell. T, Machine Learning, McGraw Hill

R Ryszard S. Michalski, Jaime G. Carbonell, and Tom M. Mitchell, Machine Learning :

An Artificial Intelligence Approach, Tioga Publishing Company.

COURSE PRE-REQUISITES: Nil

COURSE OBJECTIVES:

1 To introduce the prominent methods for machine learning

2 To study the basics of supervised and unsupervised learning.

3 To study the basics of connectionist and other architectures

COURSE OUTCOMES:

Students will be able to:

SlNo. DESCRIPTION

1 Differentiate various learning approaches, and to interpret the concepts of

supervised learning.

2 Compare the different dimensionality reduction techniques.

3 Apply theoretical foundations of decision trees to identify best split and Bayesian

classifier to label data points.

4 Illustrate the working of classifier models like SVM, Neural Networks and identify classifier model

for typical machine learning applications.

5 Identify the state sequence and evaluate a sequence emission probability from a

given HMM.

6 Illustrate and apply clustering algorithms and identify its applicability in real life

problems.

CO MAPPING WITH PO, PSO

CO

No.

Programme Outcomes (POs) Programme-

Specific Outcomes

(PSOs)

1 2 3 4 5 6 7 8 9 10 11 12 1 2 3

1 3 3 3 1 1 2 1 2

2 3 3 3 1 1 1 1 2 1

3 3 3 3 1 1 1 1 2 1 1

4 3 3 3 1 1 2 1 1 1

5 3 3 3 2 1 1 1

6 3 3 3 3 1 1 1

IT467

JUSTIFICATION FOR CO-PO-PSO CORRELATION:

JUSTIFICATION FOR CO-PO MAPPING

MAPPING LEVEL JUSTIFICATION

CS467.1-PO1 3 Knowledge ofvarious machine learning approachesinvolves solving complex

engineering problems

CS467.1-PO2 3 Principles of mathematics and engineering sciences are used in various aspects

of machine learning approaches

CS467.1-PO3 3 Using the knowledge of supervised learning concepts, we can design and

develop solutions for complex engineering problems

CS467.1-PO4 1 Supervised learning and VC dimension concepts can be used to design and

conduct experiments to provide valid conclusions

CS467.1-PO9 1 Expertise developed, which will enable the student to become a productive

member of a design team

CS467.1-PO12 2 The student will become aware of the need for lifelong learning and the

continued upgrading of technical knowledge

CS467.2-PO1 3 Comparative study of different dimensionality reduction techniques involves

solving complex engineering problems

CS467.2-PO2 3 Principles of mathematics and engineering sciences are used in various aspects

of dimensionality reduction techniques.

CS467.2-PO3 3 Knowledge of dimensionality reduction techniques can be used to design and

develop solutions for complex engineering problems

CS467.2-PO4 1 Dimensionality reduction techniques knowledge can be used to design and

conduct experiments to provide valid conclusions

CS467.2-PO9 1 Expertise developed, which will enable the student to become a productive

member of a design team

CS467.2-PO12 1 The student will become aware of the need for lifelong learning and the

continued upgrading of technical knowledge

CS467.3-PO1 3

Knowledge of theoretical foundations of decision trees involves solving

complex engineering problems

CS467.3-PO2

3

Principles of mathematics and engineering sciences are used intheoretical

foundations of decision treesto identify best split and Bayesian classifier to

label data points.

CS467.3-PO3 3 Knowledge of theoretical foundations of decision trees to identify best split can

be used to design and develop solutions for complex engineering problems

CS467.3-PO4 1 Theoretical foundations of decision treesto identify best split and Bayesian

classifier to label data points.knowledge can be used to design and conduct

experiments to provide valid conclusions

CS467.3-PO6 1 Knowledge of theoretical foundations of decision trees to identify best split

and Bayesian classifier to label data points. will help understand issues and

societal problems related to cybercrimes and computer hacking

CS467.3-PO9 1 Expertise developed, which will enable the student to become a productive

member of a design team

CS467.3-PO12 1 The student will become aware of the need for lifelong learning and the

continued upgrading of technical knowledge

CS467.4-PO1 3 Knowledge of classifier models applications helps in solving complex

engineering problems

CS467.4-PO2 3 Principles of mathematics and engineering sciences are used in various aspects

of classifier models

CS467.4-PO3 3 Knowledge of classifier models can be used to design and develop solutions

for complex engineering problems

CS467.4-PO4 1 Various classifier models knowledge can be used to design and conduct

experiments to provide valid conclusions

CS467.4-PO9 1 Expertise developed, which will enable the student to become a productive

member of a design team

CS467.4-PO12 2 The student will become aware of the need for lifelong learning and the

continued upgrading of technical knowledge

CS467.5-PO1 3 Study of HMM involves solving complex engineering problems

CS467.5-PO2 3 Study of HMM involves principles of mathematics and engineering

CS467.5-PO3 3 Sequence emission probability evaluation knowledge can be used

to design and develop solutions for complex engineering problems

CS467.5-PO4 2 State sequence identification and sequence emission

probabilityevaluation skills can be used to design and conduct

experiments to provide valid conclusions

CS467.6-PO1 3 Knowledge of clustering algorithms involves solving complex

engineering problems

CS467.6-PO2 3 Design of clustering algorithms involves principles of mathematics

and engineering

CS467.6-PO3 3 Clustering algorithms can be used to design and develop solutions for

complex engineering problems

CS467.6-PO4 3 Clustering algorithms knowledge can be used to conduct experiments

in real life problems to provide valid conclusions

JUSTIFICATION FOR CO-PSO MAPPING

MAPPING LEVEL JUSTIFICATION

CS467.1-PSO1 1 Various learning approaches Acquire skills to design, analyse and develop

algorithms and implement them using high-levelprogramming languages.

CS467.1-PSO2 2 Knowledge of supervised learning concepts contribute skills in computing and

knowledge engineering domain.

CS467.2-PSO1 1 Knowledge of different dimensionality reduction techniques Acquire skills to

design, analyse and develop algorithms and implement them using high-

levelprogramming languages.

CS467.2-PSO2 2 Different dimensionality reduction techniques concepts contribute skills in

computing and knowledge engineering domain.

CS467.2-PSO3 1 Knowledge of different dimensionality reduction techniques contribute to

develop strong skills in developing IT solutions for different domains which

helps in the betterment of life.

CS467.3-PSO1 2 Theoretical foundations of decision trees to identify best split and Bayesian

classifier Acquire skills to design, analyse and develop algorithms and

implement them using high-level programming languages

CS467.3-PSO2 1 Theoretical foundations of decision trees and Bayesian classifier contribute

skills in computing and knowledge engineering domain

CS467.3-PSO3 1 Theoretical foundations of decision trees and Bayesian classifier techniques

contribute to develop strong skills in developing IT solutions for different

domains which helps in the betterment of life.

CS467.4-PSO1 1 Study of classifier model working acquire skills to design, analyse and develop

algorithms and implement them using high-level programming languages

CS467.4-PSO2 1 Identification of classifier model application area contribute skills in

computing and knowledge engineering domain.

CS467.4-PSO3 1 Classifier model working knowledge contribute to develop strong skills in

developing IT solutions for different domains which helps in the betterment of

life.

GAPS IN THE SYLLABUS - TO MEET INDUSTRY/PROFESSION REQUIREMENTS:

SNO DESCRIPTION PROPOSED

ACTIONS

PO MAPPING

1 Understanding of Probability

theory

Class Seminars 1, 2, 3, 4, 5, 6

PROPOSED ACTIONS: TOPICS BEYOND SYLLABUS/ASSIGNMENT/INDUSTRY VISIT/GUEST

LECTURE/NPTEL ETC

TOPICS BEYOND SYLLABUS/ADVANCED TOPICS/DESIGN:

S

No:

DESCRIPTION PO MAPPING

1 .

Fuzzy logic

1, 2, 3, 4, 5, 6

2 Deep learning

DESIGN AND ANALYSIS TOPICS:

Sl. No. DESCRIPTION PO MAPPING

1 Dimensionality Reduction techniques 1, 2, 3, 4, 5, 9, 10

2 Classification algorithms

3 Clustering algorithms

WEB SOURCE REFERENCES:

1. https://onlinecourses.nptel.ac.in/noc18_cs26/ 2. https://www.upgrad.com/machine-learning-and-artificial-intelligence

DELIVERY/INSTRUCTIONAL METHODOLOGIES:

☑ CHALK & TALK ☑ STUD.

ASSIGNMENT

☐WEB

RESOURCES

☑ LCD/SMART

BOARDS

☐ STUD.

SEMINARS

☐ ADD-ON

COURSES

ASSESSMENT METHODOLOGIES-DIRECT

☑ ASSIGNMENTS ☑STUD.

SEMINARS

☑ TESTS/MODEL

EXAMS

☐ UNIV.

EXAMINATION

☐STUD. LAB

PRACTICES

☐ STUD. VIVA ☐ MINI/MAJOR

PROJECTS

CERTIFICATIONS

☐ ADD-ON

COURSES

☐ OTHERS

ASSESSMENT METHODOLOGIES-INDIRECT

☑ ASSESSMENT OF COURSE OUTCOMES

(BY FEEDBACK, ONCE)

☑ STUDENT FEEDBACK ON

FACULTY (TWICE)

☐ ASSESSMENT OF MINI/MAJOR

PROJECTS BY EXT. EXPERTS

☐ OTHERS

Prepared by Approved by

Dr. Sherly K.K Saritha S

(Faculty in Charge) (HoD)

COURSE PLAN

Class : S7 IT

Subject

Code :

CS 467 Machine Learning

Sl.No Module Day Planned

1 I

Day

1 Introduction to Machine learning

2 I

Day

2

Examples of Machine Learning applications - Learning

associations, Classification

3 I

Day

3

Regression, Unsupervised Learning, Reinforcement

Learning.

4 I Day 4

Supervised learning- Input representation, Hypothesis

class, Version space

5 I

Day

5 Vapnik-Chervonenkis (VC) Dimension

6 I

Day

6 Revision Module-I

7 I

Day

7 Probably Approximately Learning (PAC)

8 I

Day

8 Noise, Learning Multiple classes

9 II

Day

9 Model Selection: Inductive Bias

10 II

Day

10 Generalization- Overfitting, underfitting

11 II

Day

11

Dimensionality reduction- Feature selection,

Feature extraction

12 II

Day

12 Subset selection: Backward selection

13 II

Day

13 Principle Component Analysis

14 II

Day

14 Sample problem on PCA

15

Day

15 Test-1

16 III

Day

16

Classification- Cross validation and re-sampling

methods-

17 III

Day

17 K-fold cross validation, Boot strapping,

18 III

Day

18

Measuring classifier performance- Precision, recall,

ROC curves

19 III

Day

19 Bayes Theorem, Bayesian classifier

20 III

Day

20 Maximum Likelihood estimation

21 III

Day

21 Density functions

22 III

Day

22 Regression

23 IV

Day

23

Decision Trees- Entropy, Information Gain, Tree

construction

24 IV

Day

24 ID3

25 IV

Day

25

Issues in Decision Tree learning- Avoiding Over-

fitting, Reduced Error Pruning

26 IV

Day

26 The problem of Missing Attributes, Gain Ratio,

27 IV

Day

27 Classification by Regression (CART),

28 IV

Day

28

Neural Networks- The Perceptron, Activation

Functions,

29 IV

Day

29

Training Feed Forward Network by Back

Propagation.

30 V

Day

30 Kernel Machines

31 V

Day

31

Support Vector Machine- Optimal Separating hyper

plane, Soft-margin hyperplane

32 V

Day

32 Kernel trick, Kernel functions

33 V

Day

33 Discrete Markov Processes

34 V

Day

34 Hidden Markov models

35 V

Day

35

Three basic problems of HMMs- Evaluation problem,

finding state sequence, Learning model parameters

36 V

Day

36

Combining multiple learners,Ways to achieve

diversity

37 V

Day

37

Model combination schemes, Voting, Bagging,

Booting

38 VI

Day

38 Unsupervised Learning - Clustering Methods

39 VI

Day

39 K-means clustering

40 VI

Day

40 Expectation-Maximization Algorithm

41 VI

Day

41 Hierarchical Clustering Methods

42 VI

Day

42 Density based clustering

CS467 Machine Learning

Assignment Questions

Assignment-1

Q.1

1. State Bayes theorem and illustrate it with an example.

2. Explain naive Bayes algorithm.

3. The following table consists of training data from an employee database. For a given row entry,

count represents the number of data tuples having the values for department, status, age, and

salary given in that row. Let status be the class label attribute. Given a data tuple having the

values “systems”, “31..35”, and “46–50K” for the attributes department, age, and salary,

respectively, what would a Naive Bayesian classification of the status for the tuple be?

Q.2

1. Explain the ID3 algorithm for learning decision trees.

2. Apply ID3 algorithm to construct a decision tree using the given training tuples (Cheat represents

the class). Group income into categories ranges: (60K – 80K), (80K - 100K), (100K-120K),

>120K

3 With the following data set, generate a decision tree and predict the class label for a data point

with values <Female, 2, standard, high>.

Assignment-2

Q.1 a) Draw the flow chart of K-means clustering algorithm and describe its working.

b)Suppose that the datamining task is to cluster the following seven points (with (x,y) representing

location) into two clusters A1(1,1), A2(1.5,2), A3(3,4), A4(5,7), A5(3.5,5), A6(4.5,5), A7(3.5,4.5)

The distance function is City block distance. Suppose initially we assign A1,A5 as the centre for

each cluster respectively. Using the K-means algorithm to find the three clusters and their centres

after two round of execution.

Q.2 a) Describe Neural network training process

b) Apply back propagation algorithm in the given network and illustrate the training process of

neural network classifier. Given: Let the learning rate be 0.9. The initial weight and bias values of

the network are given in Table, along with the first training tuple, X = (1, 0, 1), whose class label is

1.

IT 465

CYBER FORENSICS

COURSE INFORMATION SHEET

PROGRAMME: INFORMATION TECHNOLOGY DEGREE: BTECH (JULY 2019– NOVEMBER 2019)

COURSE: CYBER FORENSICS SEMESTER: VII

COURSE CODE: IT 465 COURSE TYPE: CORE

COURSE AREA/DOMAIN: CYBER SECURITY CONTACT HOURS: 3 hours/Week.

CORRESPONDING LAB COURSE CODE (IF ANY): LAB COURSE NAME:

SYLLABUS:

UNIT DETAILS HOURS

I Introduction to Cyber forensics: Information Security Investigations, Corporate Cyber

Forensics, Scientific method in forensic analysis, investigating large scale Data breach cases.

Analyzing Malicious software.

6

II Types of Computer Forensics Technology, Types of Military Computer Forensic

Technology, Types of Law Enforcement, Computer Forensic Technology, Types

of Business Computer Forensic Technology, Specialized Forensics Techniques,

Hidden Data and How to Find It, Spyware and Adware, Encryption Methods and

Vulnerabilities, Protecting Data from Being Compromised Internet Tracing

Methods, Security and Wireless Technologies, Avoiding Pitfalls with Firewalls

Biometric Security Systems

7

III Types of Computer Forensics Systems: Internet Security Systems, Intrusion Detection

Systems, Firewall Security Systems, Storage Area Network Security Systems, Network

Disaster Recovery Systems, Public Key Infrastructure Systems, Wireless Network Security

Systems, Satellite Encryption Security Systems, Instant Messaging (IM) Security Systems, Net

Privacy Systems, Identity Management Security Systems, Identity Theft, Biometric Security

Systems

6

IV Ethical Hacking: Essential Terminology, Windows Hacking, Malware, Scanning, Cracking.

Digital Evidence in Criminal Investigations: The Analog and Digital World, Training and

Education in digital evidence, Evidence Collection and Data Seizure: Why Collect Evidence,

Collection Options Obstacles

7

V Types of Evidence: The Rules of Evidence, Volatile Evidence, General Procedure, Collection

and Archiving, Methods of Collection, Artifacts, Collection Steps, Controlling Contamination:

The Chain of Custody, Reconstructing the Attack, The digital crime scene, Investigating

Cybercrime, Duties Support Functions and Competencies.

9

VI Identification of Data: Timekeeping, Forensic Identification and Analysis of Technical

Surveillance Devices, Reconstructing Past Events: How to Become a Digital Detective,

Useable File Formats, Unusable File Formats, Converting Files, Investigating Network

Intrusions and Cyber Crime, Network Forensics and Investigating logs, Investigating network

Traffic, Investigating Web attacks, Router Forensics. Cyber forensics tools and case studies.

7

TOTAL HOURS 42

TEXT/REFERENCE BOOKS:

T/R BOOK TITLE/AUTHORS/PUBLICATION

1 John R. Vacca, Computer Forensics: Computer Crime Scene Investigation, 2nd Edition, Charles River

Media, 2005

2 Christof Paar, Jan Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners, 2 nd

Edition, Springer, 2010

3 Ali Jahangiri, Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical

Hackers & IT Security Experts, Ali Jahangiri, 2009

4 Computer Forensics: Investigating Network Intrusions and Cyber Crime (Ec-Council Press Series: Computer

Forensics), 2010

COURSE PRE-REQUISITES:

C.CODE COURSE NAME DESCRIPTION SEM

IT 307 COMPUTER NETWORKS Basic awareness of network communication V

COURSE OBJECTIVES:

1 To understand cyber related crimes and various investigative strategies

2 To understand Computer Forensics, Computing Investigations

3 To study forensically sound principles and practices related to digital evidence collection, management, and

handling.

4 To study the concepts in ethical hacking

COURSE OUTCOMES:

Sl No DESCRIPTION

Blooms’

Taxonomy Level

C01 Understand the definition of computer forensics fundamentals. Understand

(Level 2)

C02 Evaluate the different types of computer forensics technology

Evaluate

(Level 5)

C03 Analyze various computer forensics systems.

Analyze

(Level 4)

C04 Apply the methods for data recovery, evidence collection and data seizure Apply

(Level 3)

C05 Gain your knowledge duplication and preservation of digital evidence. Knowledge

(Level 1)

CO-PO AND CO-PSO MAPPING

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3

C01 2 _ 2 _ _ _ _ _ _ _ _ _ 1 _ _

C02 1 2 1 _ _ _ _ _ _ _ _ 2 _ 1

C03 _ 1 2 - _ _ _ _ _ _ _ _ 1 _

C04 1 _ _ _ _ _ _ _ _ 1 2

C05 1 _ _ _ _ _ _ _ _ _ _ 2 _

JUSTIFICATIONS FOR CO-PO MAPPING

MAPPING LOW/MEDIUM/HIGH JUSTIFICATION

C01-PO1 L Graduate attains a basic understanding about facts behind cyber attacks.

C01-PO3 H Graduate is equipped to use Network forensics tools.

C01-PSO1 M Graduate is made able to identify the core principles of data breach cases

C02-PO2 M Graduate is made capable of identifying the hacking techniques.

C02-PO4 M Graduate is able to apply the knowledge of network tools.

C0.2-PSO3 M Graduate is able to use functions of windows hacking methods.

C03-PO2 M Graduate will be able to create corporate cyber forensics environment.

C03-PO3 M Graduates are able to test different cyber attacks.

C03-PSO1 L Graduate attains a basic knowledge on Military cyber forensics.

C04-PO1 L Graduate achieves a basic insight on PHP programming languages.

C04-PO2 M Graduate is able to analyze a problem in cyber area

C04-PO2 H Graduate is able to develop solutions to complex problems in network

environment.

C04-PSO1 M Graduates achieve knowledge on hacking scripts.

C05-PO1 H Graduate is made able to familiarize tools used in network area.

WEB SOURCE REFERENCES:

1 www.w3schools.com/

2 www.w3.org/

3 www.htmldog.com / Tutorials/ HTML

4 www.validator.w3.org/

5 www.php.net/manual/en/index.php

6 httpd.apache.org/download.cgi

7 https://alistapart.com/article/frameworks

8 http://getbootstrap.com/css/

9 https://www.w3.org/TR/WD-DOM/introduction.html

DELIVERY/INSTRUCTIONAL METHODOLOGIES:

CHALK & TALK STUD.

ASSIGNMENT

WEB RESOURCES

LCD/SMART

BOARDS

STUD. SEMINARS ADD-ON COURSES

ASSESSMENT METHODOLOGIES-DIRECT

ASSIGNMENTS STUD. SEMINARS TESTS/MODEL

EXAMS

UNIV.

EXAMINATION

STUD. LAB

PRACTICES

STUD. VIVA MINI/MAJOR

PROJECTS

CERTIFICATIONS

ADD-ON COURSES OTHERS

ASSESSMENT METHODOLOGIES-INDIRECT

ASSESSMENT OF COURSE OUTCOMES (BY

FEEDBACK, ONCE)

STUDENT FEEDBACK ON FACULTY

(TWICE)

ASSESSMENT OF MINI/MAJOR PROJECTS BY EXT.

EXPERTS

OTHERS

Prepared by Approved by

Ms. Mathews Abraham Prof.Saritha S

(Faculty) (H.O.D)

Course plan

No Days Topics

1

Day 1

Introduction to Cyber forensics

2

Day2

Information Security Investigations

3

Day3

Corporate Cyber Forensics - Scientific method in forensic

analysis

4

Day4

Investigating large scale data breach cases

5

Day 5

Malicious software

6

Day 6

Types of Computer Forensics Technology- Types of Military

Computer Forensic Technology

7

Day 7

Types of Law Enforcement- Computer Forensic Technology

8

Day 8

Types of Business Computer Forensic Technology, Specialized

Forensics Techniques

9

Day 9

Hidden Data and How to Find It, Spyware and Adware.

10

Day 10

Encryption Methods and Vulnerabilities, Protecting Data from

Being Compromised Internet Tracing Methods.

11

Day11

Security and Wireless Technologies, Avoiding Pitfalls with

Firewalls Biometric Security Systems.

12

Day12

Types of Computer Forensics Systems: Internet Security

Systems, Intrusion Detection Systems.

13

Day13

Firewall Security Systems, Storage Area Network Security

Systems - Network Disaster Recovery Systems

14

Day14

Public Key Infrastructure Systems, Wireless Network Security

Systems

15

Day 15

Satellite Encryption Security Systems- Instant Messaging (IM)

Security Systems

16

Day 16

Net Privacy Systems

17

Day 17

Identity Theft Biometric Security Systems

18

Day 18

Ethical Hacking

19

Day 19

Windows Hacking - Malware and Scanning

20 Cracking. Digital Evidence in Criminal Investigations.

Day20

21

Day 21

The Analog and Digital World.

22

Day 22

Training and Education in digital evidence

23

Day23

Evidence Collection and Data Seizure

24 Day 24

Need of collecting evidence

25

Day25

Types of Evidence and the Rules of Evidence.

26

Day26

Volatile Evidence - General Procedure and Collection and

Archiving

27

Day27

Methods available for Collection of digital evidence

28

Day 28

The Chain of Custody, Reconstructing the Attack The digital

crime scene.

29

Day29

Investigating Cybercrime, Duties Support Functions and

Competencies.

30

Day30

Ethical hacking practical examples.

31

Day31

White hackers and black hackers comparison

32

Day32

Identification of Data and Timekeeping information

33

Day33

Forensic Identification and Analysis of Technical Surveillance

Devices.

34

Day34

Reconstructing Past Events of digital evidences How to

Become a Digital Detective.

35

Day35

Useable File Formats- Unusable File Formats Converting Files

of digital evidence

36

Day36

Investigating Network Intrusions and Cyber Crime

37

Day37

Network Forensics and Investigating logs

38

Day38

Investigating network Traffic, Investigating Web attacks

39

Day39

Router Forensics

40

Day40

Cyber forensics tools and case studies

Assignment Questions

Assigment 1

1. Write notes on Cyber security Future challenges and opportunities.

2. Write notes on important security tools used in industry.

Assignment 2

1. With an example explain the imprtance of Ethical hacking.

2. Write a short notes on following items.

a. Black hacker

b. White hacker

c. Different Malwares.

d. Net Privacy Systems,

IT 403

MOBILE COMPUTING

COURSE INFORMATION SHEET

PROGRAMME: INFORMATION

TECHNOLOGY

DEGREE: BTECH YEAR:

August2019 –November 2019

COURSE: MOBILE COMPUTING SEMESTER: VII CREDITS: 3

COURSE CODE: IT403 COURSE TYPE: CORE /ELECTIVE /

BREADTH/ S&H

COURSE AREA/DOMAIN:

NETWORKING

& COMMUNICATION

CONTACT HOURS: 3+1 (Tutorial)

hours/Week.

CORRESPONDING LAB COURSE

CODE (IF ANY):

LAB COURSE NAME:

SYLLABUS:

UNIT DETAILS HOURS

I

Introduction - issues in mobile computing, Wireless

Communication Technologies - Cellular Wireless networks,

Wireless (802.11), TCP/IP in the mobile setting, Geolocation and

Global Positioning System (GPS), Third Generation (3G) Mobile

Services: Introduction to International Mobile Telecommunications

2000 (IMT 2000) vision, Wideband Code Division Multiple Access

(W-CDMA), and CDMA 2000, Quality of services in 3G.

7

II

GSM- System Architecture-Protocols-Connection Establishment-

Frequency Allocation-Routing-Handover-Security, GPRS

7

III

Mobile Network Layer: Mobile IP (Goals, assumptions, entities and

terminology, IP packet delivery, agent advertisement and discovery,

registration, tunneling and encapsulation, optimizations), Dynamic

Host Configuration Protocol (DHCP).

7

IV

Mobile Transport Layer : Traditional TCP, Indirect TCP, Snooping

TCP, Mobile TCP, Fast retransmit/fast recovery, Transmission

/time-out freezing, Selective retransmission, Transaction oriented

TCP.

7

Mobile Ad hoc Networks (MANETs): Overview, Properties of a

V MANET, spectrum of MANET applications, routing and various

routing algorithms, security in MANETs.

7

VI

Protocols and Tools: Wireless Application Protocol-WAP.

(Introduction, protocol architecture, and treatment of protocols of

all layers) Mobile Application Development(Android) M-

commerce

7

TOTAL HOURS

42

TEXT/REFERENCE BOOKS:

T/R BOOK TITLE/AUTHORS/PUBLICATION

T1 Jochen Schiller, Mobile Communications, Second Edition, Pearson Education

T2 William Stallings, Wireless Communications and Networks, Pearson

Education.

T3 Kaveh Pahlavan, Prasanth Krishnamoorthy, Principles of Wireless Networks,

Pearson Education

R1 Behrouz A. Forouzan, Data Communications and Networking, 4/e, Tata

McGraw Hill.

R2 C.K.Toh, AdHoc Mobile Wireless Networks-, First Edition Pearson

Education.

R3 Shu Lin, Daniel J Costello, Error Control Coding Fundamentals and

Applications: Prentice Hall Inc, 1983

COURSE PRE-REQUISITES:

C.CODE COURSE NAME DESCRIPTION SEM

Nil

COURSE OBJECTIVE:

1 To learn about the basic concepts of Mobile Computing.

2 To understand about networking concepts relevant to modern wireless systems.

3 To introduce emerging mobile computing ideas and best practices

4 To gain hands-on knowledge practice with mobile computing

COURSE OUTCOMES:

CO-PO MAPPING AND CO-PSO MAPPING

PO

CO

P

O1

P

O2

P

O

3

P

O

4

P

O

5

P

O

6

P

O

7

P

O

8

P

O

9

P

O

10

P

O

11

P

O

12

PS

O1

PS

O2

PS

O3

C403.

1

1 2 - 3 - - - - - - - - 3 - 2

C403.

2

- 1 - 2 - - - - - - - - 3 - 1

C403.

3

- 2 - 2 - - - - - - - - 3 - 1

C403.

4

- 1 - 2 - - - - - - - - 3 - 2

C403.

5

2 1 - - 3 - - - - - - - 3 1 2

403

CS40

3

(Over

all

attain

ment)

Sl.

No.

CO.

No.

DESCRIPTION BLOOMS

TAXONO

MY

LEVELS

1 C403.

1

Enables the students to analyze and compare the

various wireless communication technologies.

Level 2,4

2 C403.

2

Enables the students to visualize the various

important steps in GSM communication

Level 1

3 C403.

3

Enables the students to analyze the mobile IP and

Transport Protocol.

Level 2

4 C403.

4

Enables the students to examine the important

aspects of Mobile Adhoc Networks

Level 3

5 C403.

5

Enables the students to apply the knowledge gained

to design and develop a mobile application

Level 3

JUSTIFICATIONS FOR CO-PO MAPPING

Mapping Low/Medium/High Justification

C403.1-

PO1

L Applying the knowledge gained to understand the

various wireless communication technologies

C403.1-

PO2

M Analyzing the mobile computing technology to

understand the challenges in the mobile computing

environment

C403.1-

PO4

H Understanding the concept of cellular wireless

networks and how the different protocols work in

mobile environment

C403.2-

PO2

L Understanding the GSM System architecture and

also the various functions involved in GPRS

C403.2-

PO4

M Studies about the various routing techniques,

frequency allocation ,method, handover and security

mechanism in GSM

C403.3-

PO2

M Understanding the Network layer and Transport

layer protocols in mobile computing environment

C403.3-

PO4

M Analyzing and comparing how the network layer

and transport layer protocols function when

operating in a mobile setting

C403.4-

PO2

M Understanding the working, properties, applications

and functions of Mobile Adhoc Networks

C403.4-

PO4

M Studies about how routing protocols and algorithms

work in Mobile Adhoc Networks and how security

is attained

C403.5-

PO1

M Understanding the Wireless Application Protocol

and how all the different layers behave

C403.5-

PO2

L They could apply the knowledge acquired on

developing various mobile application using

Android

C403.5-

PO5

H Developing an M-Commerce application using

various tools available

GAPS IN THE SYLLABUS - TO MEET INDUSTRY/PROFESSION

REQUIREMENTS:

SNO DESCRIPTION Mapping

to PO

PROPOSED

ACTIONS

1 Designing and developing programs that implements

various protocols

PO3,

PO4,

PO5

Lab Session

PROPOSED ACTIONS: TOPICS BEYOND SYLLABUS/ASSIGNMENT/INDUSTRY

VISIT/GUEST LECTURER/NPTEL ETC

TOPICS BEYOND SYLLABUS/ADVANCED TOPICS/DESIGN:

Sl.

No

DESCRIPTION Mapping to P

O

1 Implementation/ simulation of the protocols PO3, PO4,

PO5

WEB SOURCE REFERENCES:

1 en.wikipedia.org/wiki/

2 https://www.cise.ufl.edu/class/cen5531fa06/notes/intro-mobilecomputing.pdf

3 https://pdfs.semanticscholar.org/presentation/3988/08c5f21b28fad6075e22dc080d9e4

5b7fe6f.pdf

4 https://www3.nd.edu/~cpoellab/teaching/cse40814/Lecture1-Handouts.pdf

5 https://disco.ethz.ch/courses/ss04/mobicomp/lecture/6/Chapter6MobileIPandTCP4Slid

es.pdf

6 http://user.it.uu.se/~erikn/files/DK2-adhoc.pdf

7 https://www.cs.cmu.edu/~bam/uicourse/830spring09/BFeiginMobileApplicationDevel

opment.pdf

8 https://www.harding.edu/fmccown/android/android-workshop-2011.pdf

DELIVERY/INSTRUCTIONAL METHODOLOGIES:

CHALK &

TALK

STUD.

ASSIGNMENT

WEB

RESOURCES

LCD/SMART STUD. ADD-ON

BOARDS SEMINARS COURSES

ASSESSMENT METHODOLOGIES-DIRECT

ASSIGNMENTS STUD.

SEMINARS

TESTS/MODEL

EXAMS

UNIV.

EXAMINATIO

N

STUD. LAB

PRACTICES

STUD. VIVA MINI/MAJOR

PROJECTS

CERTIFICATIONS

ADD-ON

COURSES

OTHERS

ASSESSMENT METHODOLOGIES-INDIRECT

ASSESSMENT OF COURSE

OUTCOMES (BY FEEDBACK, ONCE)

STUDENT FEEDBACK ON

FACULTY (ONCE)

ASSESSMENT OF MINI/MAJOR

PROJECTS BY EXT. EXPERTS

OTHERS

Prepared by

Approved by

Ms. BENY WILSON

Ms. Saritha S

(H.O.D)

COURSE PLAN

Sl

No Day

Mo

dul

e

Topic

1 Day 1 1 Introduction

2 Day 2 1 Issues in mobile computing

3 Day 3 1

Wireless Communication Technologies- Celluar

Wireless networks ,Wireless(802.11), TCP/IP in the

mobile setting

4 Day 4 1

Geolocation and Global Positioning System (GPS)

Third Generation (3G) Mobile Services: Introduction to

International Mobile Telecommunications 2000 (IMT

2000) vision

5 Day 5 1 IMT 2000

6 Day 6 1

Wideband Code Division Multiple Access (W-CDMA),

and CDMA 2000

7 Day 7 1 Quality of services in 3G

8 Day 8 2 GSM- System Architecture-Protocols

9 Day 9 2 Connection Establishment-Frequency Allocation

10 Day 10 2 Routing-Handover-Security

11 Day 11 2 GPS Security, GPRS

12 Day 12 3 Mobile Network Layer : Mobile IP

13 Day 13 3 Mobile Ip

14 Day 14 3 Mobile IP

15 Day 15 3 DHCP

16 Day 16 4

Mobile Transport Layer : Traditional TCP, Indirect

TCP

17 Day 17 4 Snooping TCP, Mobile TCP

18 Day 18 4

Fast retransmit/fast recovery, Transmission /time-out

freezing, Selective retransmission

19 Day 19 4 Transaction oriented TCP

20 Day 20 5 Mobile Adhoc Networks (MANETs): Overview

21 Day 21 5

Properties of a MANET, spectrum of MANET

applications, routing

22 Day 22 5 Routing and various routing algorithms

23 Day 23 5 Security in MANETs

24 Day 24 5 security in MANETs

25 Day 25 6

Protocols and Tools : Wireless Application Protocol-

WAP

26 Day 26 6 WAP

27 Day 27 6 WAP

28 Day 28 6

Mobile Application Development(Android) M-

commerce

29 Day 29 6

Mobile Application Development(Android) M-

commerce

30 Day 30 6

Mobile Application Development(Android) M-

commerce

31 Day 31 Workshop

32 Day 32 Workshop

33 Day 33 Workshop

Assignment Questions

1. Broadly classify the Mobile Computing Applications

2. Describe how a typical call in a single MTSO Area

3. List five ways of increasing the capacity of a cellular system

4. List and briefly define different performance metrics that may be used to make the

handoff decision.

5. Describe the 802.11 Architecture

6. Which types of different services does GSM offer? Give some examples and

reasons why these services have been separated.

7. How and where is user-related data represented/stored in the GSM system? How is

user data protected from unauthorized access, especially over the air interface?

8. What are the limitations of a GSM cell in terms of diameter and capacity

(voice,data) for the traditional GSM, HSCSD, GPRS? How can the capacity be

increased?

9. Name the consequences and problems of using IP together with the standard

routing protocols for mobile communications.

10. Name the consequence sand problems of using IP together with the standard

routing protocols for mobile communications.

11. Explain packet flow if two mobile nodes communicate and both are in foreign

networks. What additional routes do packets take if reverse tunneling is required?

12. Can the problems using TCP be solved by replacing TCP with UDP? Where could

this be useful and why is it quite often dangerous for network stability?

13. Show the interaction of mobile IP with standard TCP. Draw the packet flow from a

fixed host to a mobile host via a foreign agent. Then a handover takes place. What

are the following actions of mobile IP and how does TCP react?

14. Name further optimizations of TCP regarding the protocol overhead which are

important especially for narrow band connections

15. List the applications of MANETs

16. Explain the security mechanism in MANET

17. Describe the routing algorithms in Mobile Adhoc Networks

18. Explain the architecture of WAP

19. Design and develop a mobile application based on Android

IT451

Seminar

RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY

COURSE INFORMATION SHEET

IT451 – SEMINAR AND PROJECT PRELIMINARY

PROGRAMME: Information Technology DEGREE: B.Tech

COURSE: Seminar and Project Preliminary SEMESTER: S7 CREDITS: 2

COURSE CODE: IT451 REGULATION: 2016 COURSE TYPE: Core

COURSEAREA/DOMAIN: Engineering (AllBranches) CONTACT HOURS: 4(Practical) + 1(Tutorial) Hours /

Week

CORRESPONDING LAB COURSE CODE (IF ANY):NA LAB COURSE NAME:NA

SYLLABUS:

PHASE DETAILS HOURS

I Seminar: Each student shall identify a topic of current relevance in his/her branch of engineering, get

approval of faculty concerned, collect sufficient literature on the topic, study it thoroughly, prepare

own report and present in the class.

20 (4

Weeks)

II Project preliminary:

Identify suitable project relevant to the branch of study. Form project team (not exceeding four

students). The students can do the project individually also. Identify a project supervisor. Present

the project proposal before the assessment board (excluding the external expert) and get it

approved by the board.

The preliminary work to be completed:

(1) Literature survey

(2) Formulation of objectives

(3) Formulation of hypothesis/design/methodology

(4) Formulation of work plan

(5) Seeking funds

(6) Preparation of preliminary report

Note: The same project should be continued in the eighth semester by the same project team.

25 (5

Weeks)

TOTAL HOURS 45

Rajagiri School of Engineering & Technology

85

COURSE PRE-REQUISITES: NIL

COURSE OBJECTIVES:

1 To develop skills in doing literature survey, technical presentation and report preparation.

2 To enable project identification and execution of preliminary works on final semester project

COURSE OUTCOMES:

Ref. No. DESCRIPTION Blooms

Taxonomy Level

IT451.1 The students will be able to analyze a current topic of professional interest and

present it before an audience.

Analyze

(Level4)

IT451.2 The student will beable to identify an engineering problem, analyze it and propose

a work plan to solve it.

Analyze & Create

(Level4, 6)

CO-PO AND CO-PSO MAPPING

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3

IT451.1 3 3 3 2 2 - 3 3 3 _ 2 1 3

IT451.2 3 3 3 3 3 - - _ 3 3 3 - 2 3

JUSTIFICATIONS FOR CO-PO MAPPING

MAPPING LOW/MEDIUM/HIGH JUSTIFICATION

IT451.1-PO1 H Students will apply the engineering knowledge to analyze a current

topic of professional interest in the Information Technology field.

IT451.1-PO3 H Students will design and develop solutions for complex engineering

problems by developing innovative components, products, processes

and technology.

IT451.1-PO5 H Students shall learn the use of tools for innovation & creative thinking

and modern modeling tools etc. for innovation and development of

components, products and processes.

IT451.1-PO6 M Students shall also consider societal aspects like health, safety, legal

and cultural in addition to functional aspects while innovating and

developing components, products and processes.

IT451.1-PO7 M Students shall also consider environmental issues and the need for

sustainable development while innovating and developing components,

products and processes.

IT451.1-PO9 H Students shall develop individual skills as well as team & leadership

skills while working in student groups.

IT451.1-PO10 H Students shall develop communication skills whilepresentingseminar

before an audience.

IT451.1-PO11 H Students shall develop project management skills while working in

Rajagiri School of Engineering & Technology

86

groups and managing the development of components, products and

processes.

IT451.1-PSO1 M Students shall also apply IT specific skills while developing

components, products and processes.

IT451.1-PSO2 L Students shall develop software prototypes to prove their design as part

of developing innovative products and solutions, though the full

software development life cycle is not intended as part of this course.

IT451.1-PSO3 H Students shall also develop professional skills like research and

entrepreneurship skills while working as a team to develop innovative

products and solutions.

IT451.2-PO1 H Students will apply the engineering knowledge while analyzing the

problem requirements and arriving at workable design solutions.

IT451.2-PO2 H Students shall develop strong problem analysis skills while identifying

and analyzing problems and arriving at innovative solutions for

problems.

IT451.2-PO3 H Students shall design and develop innovative solutions after identifying

and analyzing problems.

IT451.2-PO4 H Students shall conduct user surveys & research and analyze complex

data to arrive at conclusions as part of analyzing complex engineering

problems.

IT451.2-PO5 H Students shall use modern tools for problem identification and analysis.

IT451.2-PO9 H Students shall develop individual skills as well as team & leadership

skills while working in student groups.

IT451.2-PO10 H Students shall develop communication skills while working in student

groups.

IT451.2-PO11 H Students shall develop project management skills while working in

groups and managing the development of components, products and

processes.

IT451.2-PSO1 M Students shall also apply IT specific skills while analyzing problems

and arriving at workable design solutions.

IT451.2-PSO3 H Students shall also develop professional skills like research and

entrepreneurship skills while working as a team to analyze problems

and to arrive at workable design solutions.

DELIVERY/INSTRUCTIONAL METHODOLOGIES:

☐ CHALK & TALK√ ☐ STUD. ASSIGNMENT√ ☐ WEB RESOURCES√

☐ LCD/SMART BOARDS√ ☐ STUD. SEMINARS√ ☐DISCUSSIONS/ DEBATES√

ASSESSMENT METHODOLOGIES-DIRECT:

☐ ASSIGNMENTS ☐ STUD. PRESENTATIONS√ ☐ TESTS/MODEL EXAMS ☐ UNIV. EXAMINATION

☐ STUD. LAB PRACTICES√ ☐ STUD. VIVA√ ☐ PROJECT/SEMINAR

REPORTS √ ☐ CERTIFICATIONS√

☐ ADD-ON COURSES ☐ OTHERS√

Rajagiri School of Engineering & Technology

87

ASSESSMENT METHODOLOGIES-INDIRECT:

☐ASSESSMENT OF COURSE OUTCOMES (BY FEEDBACK,

ONCE)√ ☐ STUDENT FEEDBACK ON FACULTY (ONCE) √

☐ ASSESSMENT OF MINI/MAJOR PROJECTS BY EXPERTS√ ☐ OTHERS

Prepared by Approved by

Divya James (HOD)

Rajagiri School of Engineering & Technology

88

IT451SEMINAR AND PROJECT PRELIMINARY SCHEDULE – 2019-20

Sl.

No. Tentative Date Activity

1 14th

August Project Topic Presentation

2 16

th August-17

th

August

Project Topic Finalization & Project Abstract

submission

3 21st August Seminar Topic Finalization

4 23rd

August Seminar Presentation Start Date

5 18th

October Seminar Presentation End Date

6 25th

October Progress Evaluation by Guide

7 30th

October Intermediate Presentation

8 6th

November Progress Evaluation by Guide

9 8

th November and 13

th

November Design Presentation

10 14th

November Design Report

IT451 Seminar Guidelines

Objective:

The seminar should provide an active learning format in which students can develop the

ability to read critically and conceptually, and therefore to speak and write with

discrimination.Thus develop skills in doing literature survey, technical presentation and

report preparation.

Expected outcome:

The students will be able to analyze a current topic of professional interest and present it

before an audience.

Topic selection

Each student shall identify a topic of current relevance in his/her branch of engineering, get

approval of faculty concerned, collect sufficient literature on the topic, study it thoroughly,

prepare own report and present in the class.

It is suggested to choose the seminar topic possibly related to the main project proposal.

Approval to the selected topic

After selecting the paper, get approval from the concerned faculty in charge.

Rajagiri School of Engineering & Technology

89

Study of topic

Students are requested to acquire a thorough knowledge on the subject by referring back

papers from recently published research article from any approved international

journal/conference and reference books (These may be included as references at the end ofthe

paper) on the corresponding area.

Abstract Preparation

The abstract of the selected seminar topic is to be prepared as follows.

The seminar abstract is an important record of the coverage of topic and hence should

include:An introduction to the seminar topic,the context/relevance of the technique, the key

hypotheses, the major scientific findings and conclusions/suggestions. The abstract will be

limited to 400 words, excluding figures and tables. The abstract must contain minimum three

latest international journal papers/new technologies references to the research articles upon

which the seminar is based as well as research articles that have served as key background

material. The references shouldbe listed using a standard format (IEEE format). The abstract

must be submitted to the faculty in charge and get approval before the stipulated time bound.

Preparation of slides for seminar presentation

Slides may be presented in MS power point. Time allowed for presentation is 20 minutes for

presentation and 5 to 10 minutes for discussions and question answer session. So, number of

slides may be around 30 - 40 to adhere the time limit.

Organization of slides

i. The first slide will be a title page showing the title, name of author (presenter), roll no. and

Class.

ii. 2nd slide will contain overview of the seminar

iii. Successive slides will contain

Objectives and relevance of the topic

Introduction

Brief Literature review

Background details

Detailed study of the seminar includes system structure, methodology, design etc. arranged in

a logical sequence depending on the problem.

iv. Discussions

v. Conclusion

vi. Last page will contain references and bibliography. References must be presented in IEEE

format.

Tips for preparing slides

Each slide consists of 4 or 5 lines with enough space between lines.

Rajagiri School of Engineering & Technology

90

All equations must be typed using equation editor (available with MS office/otheroffice

suite).Avoid too many equations since these require considerable effort to understand for the

audience.

Each slide will have a title and each figure have a caption. Also include slide numbers.

Try and put more graphics as compared to text, since for a viewer this is the easiest and

fastest to comprehend.

Tips on speaking

Speak clearly and evenly (avoid elocutionary postures). Your speech must be audible

enough so that it does not seem like a general murmur.

Punctuate your speech properly; bring out the emphasis clearly. Do not drone on

monotonously. Do not speak too fast.

Avoid referring to material that you do not fully comprehend. You may land yourself

in serious trouble if someone decides to quiz you on such a topic.

Do not recite by heart (avoid memorizing your talk) nor read off from the slides

as if you are reading a text book.

Answer questions directly. Do not beat around the bush. If you do not know the

answer acknowledge gracefully without display of unnecessary aggression. If you

have not understood a question please say so; request for it to be rephrased. In

any case do not be insolent - keep quiet to get out of an awkward situation.

End your talk with a thank you.

General guidelines for theReport preparation

A bonafide report on seminar shall be submitted within one week after the presentation.

This report shallinclude, in addition to the presentation materials, all relevant

supplementary materials along with detailed answers to all the questions

asked/clarifications sought during presentation. Total No: of pages should be more than

30.

Format for Seminar Report

1. Use Times New Roman font for the entire Report – Chapter / Section Title –

Arial 18, Bold & Underline. , Heading 2 – Arial 16, Bold, Heading 3 – Arial

14, Bold, Body- Arial 12, Normal.

2. Line Spacing – Between Heading 2 – 3 lines, between lines in paragraph 1.5 lines.

3. Alignments – Chapter / Section Title – Center, Heading 2 & 3 should be Left

Aligned. Ensure that all body text is paragraph justified.

4. Figures & Tables – Ensure that all Figures and Tables are suitably numbered and

given proper names/headings.Figures name should write under the figure and table

name should above the table.For numbering refer seniors sample report.In the page

order list of tables comes after the list of figures

5. Suggestive order of documentation:

i. Top Cover

ii. Title page

iii. Certification page

Rajagiri School of Engineering & Technology

91

iv. Acknowledgement (Ensure to thank the Management, Principal, HOD, Guide and

all those who helped you with the seminar in the mentioned order).

v. Abstract

vi. Table of Contents

vii. List of Figures and Tables

viii. Chapters (Main material)

ix. Appendices, if any

x. References/Bibliography (consolidated, from main text and appendices)

Chapters (Main material) includes

1. Introduction:

* Statement of the problem/objective/topic; its relevance.

* Brief description of the structure and location of contents of the report.

2. Literature Survey:

* Primarily, discuss previous studies which specifically pertain to the selected topic.

* Attempt to minimize referring to work which is indirectly related to your topic.

* Exhaustive survey of literature based on a clear definition of the scope and focus of

the topic.

* The last part of this section must contain a brief mention of the gaps in the literature

and a justification for undertaking your study.

3. Main Material: Give appropriate title related to the topic

i. A detailed report of previous / back ground studies, if necessary (Cite references

properly at appropriate locations). Do not restrict your references to the

literature survey chapter only.

ii. Critical analysis of selected studies from the literature which includes

o System structure

o Methodology

o Design and implementation/ deployment etc.

o Findings/ Analysis,

o Any comparisons(merits & demerits)

4. Discussion/Comments:

Summary of salient observations and trends, implications on related fields and

applications

In addition to this, assess the possibility of making active theoretical contributions

such as extending a model to include more case studies.

5. Scope and desirability of further work in the area of review

6. Conclusions: 7. All references cited in the text are to be listed in alphabetic order toward the end of the report.

Evaluation criteria

Rajagiri School of Engineering & Technology

92

The student’s internal marks for seminar will be out of 50. The marks will be awarded based

on the presentation of the seminar and the report submitted by the students. Apportioning of

the marks may be decided by the seminar evaluation committee towards various aspects of

seminar such as

i. Presentation : 40% ii. Ability to answer questions : 30% & iii. Report : 30%

Mark split-ups

Content and organization of report : 5

Extent of literature survey : 5

Topic relevance : 5

Presentation skill : 5

Quality of slides : 15

Question answering : 15

Instructions:

1. All should get the seminar topic approval from the concerned faculty in charge on or

before 31th

August.

2. All should submit abstract in correct format a week before the presentation

3. Draft copy of the Seminar report should also be submitted on the day of presentation.

4. All should submit fair report within one week after the presentation in the prescribed

format. Late submission should not be encouraged.

5. PPT approval from the concerned faculty is required for the seminar presentation.

IT451Project PreliminaryGuidelines

Project work, in general, means design and development of a software system with clearly

specified objectives. Aim of preparing project design is to enable project identification and

execution of preliminary works on final semester project.

Objectives:-

The project is intended to be a challenge to intellectual and innovative abilities and to give

students the opportunity to synthesize and apply the knowledge and analytical skills learned

in the different disciplines.

Students build self-confidence, demonstrate independence, and develop professionalism by

successfully completing the project.

The main project has two phases and should be completed in two semesters. The first

phase is the design phase which is to be completed in seventh semester. The second phase

Rajagiri School of Engineering & Technology

93

project implementation and testing is carried out in eighth semester. Project work is to be

done by student groups having maximum of four members in one group.

Project preliminary:

Identify suitable project relevant to the branch of study. Form project team (not exceeding

four students). The students can do the project individually also. Present the project proposal

before the assessment board (excluding the external expert) and get it approved by the board.

The preliminary work to be completed:

(1) Define the problem/Introduction

(2) Literature survey

(3) Formulation of objectives

(4) Formulation of hypothesis/design/methodology

(5) Formulation of work plan

(6) Preparation of preliminary report

Note: The same project should be continued in the eighth semester by the same project team.

Expected outcome:

The students will be able to identify an engineering problem, analyze it and propose a work

plan to solve it.

1. Project Phases& Evaluation Schemes

Phase I : Project Proposal submission to Project Coordinator.

A detailed description of the proposed project should be given in not less than two pages.

Contents : Project Overview, Applications, Motivations, References.

Phase II : Approval of project proposal and allotment of guide to each group.

Project approval can be based on relevance of the topic, On rejection of the proposal, the remedial

measure suggested by project coordinator has to be adopted. It should be completed within five

days of proposal submission.

Phase III : Weekly Project Evaluation

Weekly project evaluation is done based on the following criteria during the lab hours allotted for

project in a week.

a. Literature Review/Study of Existing System/Proposal of Proposed System/Identification

of Tools or Language.

b. Preliminary Report Preparation and Submission

c. Design Phase and Methodology Study

d. Design Report Submission

e. Design Presentation

Selection of Area/project Title:

Rajagiri School of Engineering & Technology

94

Students are expected to select project themes/titles in any emerging area/ relevant

topic of interest with the assistance of identified faculty members (project guide assigned by

project coordinator) during the first week of the seventh semester.

StudentscansubmitprojectproposalsbasedonIEEE2018/2019researchpapersoritcanbean

application oriented(Android, Ardruino etc.) project. A detailed description of the proposed project

should be given in not less than two pages.

Contents: Project Overview, Applications, Motivations, References.

These proposals are to be screened by the evaluation committee (EC- minimum of 3

faculty members) constituted by the head of department, which will include a Chairman and

the EC will evaluates the suitability and feasibility of the project proposal. The EC can

accept, accept with modification, request a resubmission, or reject a project proposal. On

rejection of the proposal, the remedial measure suggested by the EC has to be adopted. Once

the project get approved by the EC, each team will be allocated a project guide and the team

can finalize the project and prepare the final abstract incorporating the points suggested by

the research group/guide.

An abstract should have the following seven pieces such as Introduction, Problem

Statement, methodology, expected outcome, Applications, Motivations, conclusion and

References. In Introduction, one describes the purpose for doing such a project. It is needed

to identify the problem that has been considered in the project. In methodology, the approach

used to investigate the problem should be mentioned in the abstract. Also abstract must

clearly state the outcomes/achievements expected through the execution of the project and

finally conclusions are given. Since an abstract is so short, each section is usually only one

or two sentences long.

Each student shall maintain a project work book. Every activity done as part of

project work is to be recorded in the project book, as and when it is done. Project guide shall

go through these records periodically, and give suggestions/comments in improving the

project work. The progress from concept to final design and report preparation, through

problem definition and the selection of alternative solutions is monitored by the respective

research team.

Design phase

Stage 1

At the beginning of the project, students are required to submit a project plan in the project

book. Stage 1 of the project design should cover the following matters. 1. Problem definition and objectives

2. Introduction

3. Literature survey

4. System Architecture

5. Implementation requirements and time schedule

Stage 2

Rajagiri School of Engineering & Technology

95

1. System Analysis and Design

2. Testing Strategies and Expected Outcomes

3. Risks and Challenges 4. Conclusion

5. References

6. Appendices

The students have to submit the design report, along with project work book showing

details of the work carried out by him/her and a power point presentation at the end of the 7th

semester to EC after getting the approval from the project guide. The EC canaccept, accept

with modification, request a resubmission, or extension of the project.

NOTE: The project report should be brief and include descriptions of work carried out by others only

to the minimum extent necessary. Verbatim reproduction of material available elsewhere should be

strictly avoided. Where short excerpts from published work are desired to be included, they should be

within quotation marks appropriately referenced.

The student’s internal marks for project will be out of 50, in which 20 marks will be

based on day to day performance assessed by the guide. Balance 30 marks will be awarded

based on the presentation of the project by the students before an evaluation committee

consists of a minimum of 3 faculty members including the guide. There will be two progress

evaluations, mid semester and end semester(10+10=20 marks).

N.B .

1. Weekly evaluation must ensure strict adherence to design report in all phases of the project

work

2. All reports should strictly adhere to the given template.

3. For Project, the minimum for a pass shall be 50% of the total marks assigned to the

Project work.

Rajagiri School of Engineering & Technology

96

IT431

Web Application Development Lab

Rajagiri School of Engineering & Technology

97

COURSE INFORMATION SHEET - 2019

PROGRAMME : INFORMATION TECHNOLOGY DEGREE: BTECH

COURSE: Web Application Development Lab

SEMESTER :VII

CREDITS :1

COURSE CODE : IT431

REGULATION :2010

COURSE TYPE : CORE

COURSE AREA/DOMAIN: Web Application CONTACT HOURS :3 hours/Week.

CORRESPONDING LAB COURSE CODE (IF ANY): LAB COURSE NAME:

SYLLABUS:

UNIT DETAILS HOURS

1

1.Authentication using Java Servlet

2. Authentication using JSP

3. Authentication using MVC Architecture

4. Design and development of Online Book Shop

5. Design and development of Online Examination

6. Design and development of online ticket reservation system

7. Design and development of online library

8. Design and development of online banking

9. Design and development of online job portal

10. Design and development of Online Auction

30

TOTAL HOURS 30

TEXT/REFERENCE BOOKS:

T/R BOOK TITLE/AUTHORS/PUBLICATION

R

Jason Hunter, William Crawford , Java Servlet Programming, Second Edition, ,O'Reilly Media

COURSE PRE-REQUISITES:

C.CODE COURSE NAME DESCRIPTION SEM

IT409

Web application development

S7

COURSE OBJECTIVES:

Rajagiri School of Engineering & Technology

98

To develop the skill in Creating dynamic web pages with servlets

To provide knowledge in connecting java programs with database using JDBC.

To develop the skill in server side programming using JSP.

To provide knowledge about MVC Design.

Testing the application on an Application Server.

Debugging Web applications locally and remotely.

Developing applications in a team environment.

COURSE OUTCOMES:

SNO DESCRIPTION Blooms’

Taxonomy Level

C431 .1 Students will able to Write programs in java to access database.

Create (level 6

C431 .2 Students will able to Write programmes in servlet to create dynamic web pages which

access databases and track user sessions

Create (level

6)

C431 .3 Students will able to develop server side programmes in JSP.

Create (level

6)

C431 .4 Students will able to test and debug a web application.

Create

(level 6 )

C431 .5 Students can develop web application in a team environment

Create (level

6)

CO-PO AND CO-PSO MAPPING

PO

1

PO

2

PO

3

PO

4

PO

5

PO

6

PO

7

PO

8

PO

9

P0

10

PO

11

PO

12

PSO

1

PSO

2

PSO3

C431 .1 3 3 2 - 1 - - - - - - - 2 2 -

C431 .2 3 - 3 2 - - - - - - - - 2 - -

C431 .3 3 3 3 2 1 - - - - - - - 2 - -

C431 .4 - - - - 1 - - - - - - - - - 2

C431 .5 3 3 3 3 2 - - - 3 - 2 - 3 2 -

C431 Overall 3 3 2.8 2.3 1.3 3 2 2.3 2 2

JUSTIFICATIONS FOR CO-PO MAPPING

Mapping LOW

/MEDIUM Justification

Rajagiri School of Engineering & Technology

99

/HIGH

C431 .1-PO1 H Understanding the role of Database connectivity helps to find out the solution of

complex engineering problems.

C431 .1-PO2 H To analyze complex engineering problems reaching substantiated conclusions

and solutions using databases

C431 .1-PO3 H

Database connectivity and web development helps to Design solutions for

complex engineering problems and design system components or processes that

meet the specified needs

C431 .1-PO5 L

A good Database connectivity requires to select, and apply appropriate

techniques, resources, and modern engineering and IT tools and web

development.

C431 .1-PSO1 M This knowledge prepares the students for professional careers, with a strong

technical foundation.

C431 .1-PSO2 M This knowledge helps them to create new database design depending on the

requirement.

C431 .2-PO1 H Using servlets to create dynamic webpages will helps to find out the solution of

complex engineering problems.

C431 .2-PO3 H Servlets helps to Design solutions for complex engineering problems and design

system components or processes that meet the specified needs

C431 .2-PO4 M Servlets are the pioneers in modern engineering tool in web development.

C431 .2-PSO1 H The knowledge of servelets prepares the students for professional careers, with a

strong technical foundation.

C431 .3-PO1 H Using server side programming will help to find out the solution of complex

engineering problems.

C431 .3-PO2 H

server side programming helps to Design solutions for complex engineering

problems and design system components or processes that meet the specified

needs

C431 .3-PO3 H Server side programming plays a very important role in modern engineering in

web development.

C431 .3-PO4 M Server side programming requires Analysis and interpretation of data, and

synthesis of the information to provide valid conclusions

C431 .3-PO5 L Server side programming helps them in appling appropriate techniques

C431 .3-PSO1 M The knowledge of Server side programming prepares the students for

professional careers, with a strong technical foundation.

C431 .4-PO5 L Helps them in choosing the appropriate techniques in testing

C431 .4-PSO3 H Systematic planning and testing of application is possible by students

C431 .5-PO1 H Understanding the role of a good project work in group to find out the solution

of complex engineering problems.

C431 .5-PO2 H A good project work in group halps them To analyze complex engineering

problems reaching substantiated conclusions and solutions using databases

Rajagiri School of Engineering & Technology

100

C431 .5-PO3 H

A good project work in group helps to Design solutions for complex engineering

problems and design system components or processes that meet the specified

needs

C431 .5-PO4 H

A good project work in group helps them in design of experiments, analysis and

interpretation of data, and synthesis of the information to provide valid

conclusions.

C431 .5-PO5 M

A good project work in group requires to select, and apply appropriate

techniques, resources, and modern engineering and IT tools and web

development.

C431 .5-PO9 H Doing an application in team helps them build team work capability

C431 .5-PO11 M Doing an application in team helps them build team improves their

communication

C431 .5-PSO1 H Develop a capability in designing web based application

C431 .5-PSO2 M Develops a capability to integrate database as the backend of web applications

GAPS IN THE SYLLABUS - TO MEET INDUSTRY/PROFESSION REQUIREMENTS:

SNO DESCRIPTION PROPOSEDACTIONS

1 Difference between HTML and DHTML Assignment

2 AngularJS, ReachJS, NodeJS Seminar

PROPOSED ACTIONS: TOPICS BEYOND SYLLABUS/ASSIGNMENT/INDUSTRY VISIT/GUEST

LECTURER/NPTEL ETC

TOPICS BEYOND SYLLABUS/ADVANCED TOPICS/DESIGN:

1 AngularJS, ReachJS, NodeJS

WEB SOURCE REFERENCES:

1 http://www.certified-easy.com/aa.php?isbn=ISBN:8184316674&name=Web_Technologies

2 http://www.tutorialspoint.com/html/

3 http://www.xmlmaster.org/en/article/d01/

4 http://www.w3schools.com/js/

5 http://www.journaldev.com/1877/java-servlet-tutorial-with-examples-for-beginners

Rajagiri School of Engineering & Technology

101

DELIVERY/INSTRUCTIONAL METHODOLOGIES:

CHALK & TALK ☐ STUD. ASSIGNMENT WEB RESOURCES

LCD/SMART BOARDS ☐STUD. SEMINARS ☐ADD-ON COURSES

ASSESSMENT METHODOLOGIES-DIRECT

☐ASSIGNMENTS ☐STUD.

SEMINARS

TESTS/MODEL

EXAMS

UNIV.

EXAMINATION

STUD. LAB

PRACTICES

STUD. VIVA ☐ MINI/MAJOR

PROJECTS

☐ CERTIFICATIONS

☐ ADD-ON COURSES ☐ OTHERS

ASSESSMENT METHODOLOGIES-INDIRECT

ASSESSMENT OF COURSE OUTCOMES (BY

FEEDBACK, ONCE) ☐ STUDENT FEEDBACK ON FACULTY

(TWICE)

☐ ASSESSMENT OF MINI/MAJOR PROJECTS BY

EXT. EXPERTS

☐ OTHERS

Prepared by Approved by

Nikhila T Bhuvan Saritha S

(Faculty) (HOD)

Rajagiri School of Engineering & Technology

102

Lab Cycle – S7 2019(2016-20 batch)

Week 1

1. Develop static pages (using only HTML) for a book store. The website should contain the following

pages:

Home Page :

Should contain header with Bookstore Name, Images and Book Catalog hyperlink.

Catalog Page :

Category Names as dropdown.

Book List Page :

Books pertaining to the selected category in the previous page.

Should contain Book Name, Checkbox, and Submit Button.

Purchase page : (do the validation check for Phone Number, Email, Amount using javascript)

Name, Phone Number, Email, Amount (Textbox for all),

Payment Mode (Combo box).

Payment Button: On submit it should show payment successful

Week 2:

2. Design a Java Servlet program to print the request parameters.

3. Create a database in MS Access for student information system and display the details in the database

using Java Servlets

Hint: student information system should contain student name,Reg No. , address, Email and phone

number as fields

Week 3:

4. Authentication using Java Servlet

A user validation page, where the user submits the login name and password to the server.

The name and password are checked with user in server

if the data matches, a successful login page is returned.

Otherwise a failure message is shown to the user.

Week 4

5. Design and development of Online Examination

Authentication using Java Servlet

If login successful create static page with subjects for online examination

Rajagiri School of Engineering & Technology

103

According to the subject choice create test with multiple choice questions

On submit create another static page which shows correct answers

6. Authentication using JSP

A user validation page, where the user submits the login name and password to the server.

The name and password are checked with user in server

if the data matches, a successful login page is returned.

Otherwise a failure message is shown to the user.

Week 5, 6 and 7(Group Activity- students should develop and do the presentation, any additional

features implemented other than that mentioned in the question carries extra marks)

Roll No:1-7 and 34-39

7. Design and development of Online Book Shop:

HOME PAGE: The static home page must contain three frames.

USER REGISTRATION page (Name, Address, email id and Phone number)

LOGIN PAGE: Authentication using JSP

CATOLOGUE PAGE:The catalogue page should contain the category of all the books

availablein the web site in a table.

BOOK LIST PAGE: On clicking on the category it should list the details of the book related

to the category selected in a table.

Adding to cart and payment as COD Generate a tracking number and mail it to the user id

Roll No:7-12 and 53-58

8. Design and development of Online Auction

HOME PAGE

LOGIN PAGE: Authentication using JSP

Users – Purchaser, Seller

The Seller registers goods for an auction.

The Purchaser bid to buy.

AdminLogin: This module is for the administrator who may delete fake or unwanted users.

Report generation: Admin gets a report whenever wanted stating various products up for

bidding and various users registered on the website.

DB –MS Access

Rajagiri School of Engineering & Technology

104

Roll No:13-18 and 47-52

9. Design and development of online banking

HOME PAGE

LOGIN PAGE: Authentication using JSP

operations unit of the banking system which includes opening of Account,

Deposit and withdraw of funds,

Electronic funds transfer

Checkbalance and Monthly statement.

DB –MS Access

Roll No:19-25 and 40-46

10. Design and development of online job portal

HOME PAGE

LOGIN PAGE: Authentication using JSP(both seeker login and employer login)

DB –MS Access

Features for Job Seekers

Maintain resumes

Create, View, edit, personal details

Search for jobs

Apply for jobs online in real time

View Company profiles

Keep track of the jobs for which you applied

Features for Employers

Maintain company profiles

Post multiple job offers

Edit / Remove job offers

Make your job offers active

Keep track of the applications received

Reply to applicants

Roll No:26-33 and 59-64

11. Design and development of online ticket reservation system.

HOME PAGE

LOGIN PAGE: Authentication using JSP

Information about the route, departure time, arrival time of train

Number of trains available in the given route.

Booking and cancellation of tickets given the route

Rajagiri School of Engineering & Technology

105

Booking and cancellation history

User can enquire about the PNR status, seat availabilityand trains on a route.

User friendly interface to administrator and customer.

DB –MS Access

Week 8: Presentations

Group activity’s presentation

Innovative ideas in the field of E-commerce-Presentation in Group

Week 9: Exam

OPEN EXPERIMENTS

1. Book shop maintains the inventory of books that are being sold at the shop. The list includes details such

as author,title. Price, publisher and stock position. Whenever a customer wants a book, the sales person

inputs the title and author and the system searches the list and displays whether it is available or not. If it

is not, an appropriate message is displayed. If it is, then the system displays the book details and requests

for the number of copies required. If the requested copies are available, the total cost of the requested

copies is displayed; otherwise the message “Required copies not in stock” is displayed.

Design a system using a class called books with suitable number functions and constructors. Use new

operator in constructors to allocate memory space required.

2. Write a java program that reads names and scores from a data file named test1.dat, supplied with this text.

The file contains a student name on one line followed by the student’s test score on the next line. This

program should read and display each name and score. After all the scores have been displayed, the lowest

score, highest score, and

average score should be displayed.

3. Write a XHTML document with java script having pop up box.

1. Alert box

2. Confirm box

3. Prompt box

Rajagiri School of Engineering & Technology

106

4. Develop and demonstrate basic CSS document on the basis of following criteria:

1. Set body background color: white and link the external CSS document to html file.

2. Set table border to 2px solid and padding 0px.

3. Set table header border to 2px solid blue and padding 8px.

4. Set table data border to 1px solid blue and padding 8px.

5. Set ordered list font size to 80% and list style as lower-roman.

6. Set span properties as font size -100%, font style-italic, and background color – olive.

ADVANCED QUESTIONS

1. Develop and demonstrate a XHTML document that illustrates the use external style sheet, ordered list,

table, borders, padding, color, and the <span> tag.

2. Develop and demonstrate a XHTML file that includes JavaScript script for the following problems:

a) Input: A number n obtained using prompt, Output: The first n Fibonacci numbers

b) Input: A number n obtained using prompt, Output: A table of numbers from 1 to n and their squares

using alert

Course Plan(2018-19)

Week 1 HTML an d client side javascript

Week 2 Authentication using Servlets and Database connectivity

Week 3 Authentication using Java Servlet

Week 4 Online Exam

Week 5 Online Exam continuation

Week 6 Group Project

Week 7 Group Project

Week 8 Project presentation

Week 9 Exam