First Internal Exam Syllabus - MARCH 2024
SEM - VI - B. TECH. CSE (CBA/CS/BDA)
2CSE601 - Theory of Computation (RLP) |
UNIT-01 Review of Mathematical Background Sets, Functions, Logical statements, Proofs, Relations, Languages, The Principle of Mathematical induction, Recursive definitions. UNIT-02 Regular Languages and Finite Automata Regular expressions, Regular languages, Memory required to recognize a language, Finite automata, Distinguishable strings, Union, intersection and complement of regular languages, Automata with output-Moore machine, Mealy machine. UNIT-03 Nondeterminism and Kleen’s Theorem Non-deterministic finite automata, non-deterministic finite automata with ^ transitions, Kleen's theorem- Part-1 |
2CSE602 - Information Security (URT) |
Unit 1 : Introduction Information Security understanding,Security goals, Security attacks, Security services, security mechanisms Unit 3 : Classical Ciphers Symmetric cipher Model, Substitution ciphers, Transposition Ciphers, Cryptographic Algorithms and Protocols Unit 4 : Modern symmetric key ciphers Modern block ciphers, modern stream ciphers, Data Encryption standard |
2CSE603 - Network Security (NRR) |
Basics of Network Security: Basics of threats , attacks, secure routing. Security in Virtual Private Networks VPN and its types –Tunneling Protocols – Tunnel and Transport Mode –Authentication Header Encapsulation Security Payload (ESP), Implementation of VPNs., IPsec, IPSec architecture and components, PPTP VPN, L2TP VPN, SSL VPN IDS and IPS,Firewall IDS for networks, Intrusion detection versus Intrusion Protection, IPS deployment and advantages, Firewall classification, Firewall deployment, modern NIDSs, Detection versus prevention, architecture matters |
2CSE606 - Enterprise Application Development for Cloud (SS) |
Unit1:Fundamentals of Cloud Computing Cloud Computing basics, cloud service models , cloud deployment models,PaaS case studies. Unit 2:Developing & Deploying cloud native applications Development Life Cycle and EcoSystem, Development Environments on Cloud, Core and advanced Services, Configurations Managements , Application Monitoring Unit 3:Developing and Deploying cloud native applications Development Life Cycle and EcoSystem, Development Environments on Cloud, Core and advanced Services, Configurations Managements , Application Monitoring Unit 4:REST architecture and Watson APIs REST architecture, Watson REST API and Watson Studio |
2CSE604 - Cyber Crimes and Law (URT) |
Unit 1 : Cyber Crime : Definition and Origin of the Word, Cyber Crime and Information Security, Who are Cyber Criminals, Classification of Cybercrimes, E-mail Spoofing, Spamming, Cyber Defamation, Internet Time Theft, Salami Attack, Salami technique Data Diddling, Forgery, Web Jacking, Newsgroup Spam, Industrial Spying, Hacking, Online Frauds, Pornographic Offenders, Software Piracy, Credit Card Frauds, Identity Theft. Unit 2 : Cyber Offenses: How Criminals plan them, Categories of Cyber Crimes, How Criminal Plans the Attack: Active Attacks, Passive Attacks,Vulnerability Life Cycle. |
2CSE608 - Predictive Modeling (NS) |
Introduction to Predictive Analytics Introduction to Predictive Analytics and its use cases. CRISP – DM methodology and the skills required for successfully implementing Predictive Analytics / Machine Learning Use Cases Introduction to IBM SPSS Modeler SPSS Modeler interface, and the terminologies such as streams, nodes, palettes, canvas Collecting, Understanding and Analysis of Data Data Understanding stage: Collecting Initial Data and Describing Data, exploring the data and assessing the quality of data. Integrate Data Integrating datasets which are typically stored in different tables / databases. Unit of Analysis: Derive, Reclassify and SetToFlag Three nodes to set the unit of analysis: Derive, Reclassify, SetToFlag |
2CSE60E14 - Artificial Intelligence (SS) |
Unit 1: Basics of Artificial Intelligence What is intelligence? Foundations of artificial intelligence (AI). History of AI; Problem Solving- Formulating problems, problem types, states and operators, state space, search Strategies Unit 2:Uninformed and Informed Search Strategies BFS, DFS, Iterative Deepening DFS, DLS, Uniform Cost Search algorithm ,Best first search/ Greedy Best first Search, A* algorithm, heuristic functions and their applications. Unit 3:Reasoning Representation, Inference, Propositional Logic, predicate logic (first order logic), logical reasoning, forward chaining, backward chaining. |
2CSE609 - Data Security Systems (DRS) |
Unit-1 Data Security Overview and Architecture: Unit-2 Different Data Security basics: What is sensitive data, Where is your Sensitive data located, Securing sensitive data, User role entitlement management, Vulnerability Assessment, Data Encryption, Data Redaction, Blocking unauthorized access, data Risk assessment, Data Auditing, Data Real Time Alerting, Data Minimization, Purge Stale data, Data masking, Data Erasure, Data resilience. GDPR, HIPAA. What is a policy, what is compliance? Difference between Compliance and a Policy. Navigating the user interface, Using the command line interface (CLI), Access Management. |
2CSE60E27 - Data Mining and Warehousing (NS/ARP) |
Unit 1 : (Data Warehousing) Basic Concepts, Data Cube and OLAP, Design and Usage, ETL, Implementation Unit 2: Data Mining Basics Importance, Functionalities, Classification, Architecture, Major Issues, Data mining metrics,Applications, Social impacts of data, Data Mining from a Database Perspective Unit 3:Data Pre-processing Descriptive Data Summarization, Data Cleaning, Data Integration and Transformation, Data Reduction, Data Discretization |
2CSE607 - Discrete Mathematics (LMB) |
Sets, Propositions, and Principles of Counting Introduction of sets and Proposition with real-life examples, Principles of Counting: the principle of inclusion-exclusion, the addition and multiplication rules, the pigeonhole principle, Permutation and combination, Binomial Coefficients. Graphs Basic terminology, Graph Representation, multi- and weighted graphs, paths, circuits, subgraph. Relations and functions Properties of binary relations, equivalence relation, partitions, partial ordering, Functions: domain and range of a function, one-to-one functions. |