Published using Google Docs
[SYLLABUS] SEM 7 - SECOND INTERNAL EXAM - November 2024.docx
Updated automatically every 5 minutes

Second Internal Exam Syllabus - November 2024

SEM - VII - B. TECH. CSE (CBA/CS/BDA)

2CSE701 - COMPILER DESIGN ( RLP )

UNIT-02

B1ottom-up parsing, operator precedence parsing, LR parsers (SLR,LALR, LR), Parser

generation.

UNIT-03

Syntax Directed Translation & Run Time Environment: Syntax Directed Definitions,  Evaluation Orders for Syntax Directed Definitions, Type Checking, storage organization, Storage allocation strategies, Symbol table, Error Detection & Recovery.

UNIT-04

Intermediate Code Generation & Code Generation: Different Intermediate Forms -

Abstract Syntax tree, Polish Notation, 3 address code, Implementation of 3 address

code-Quadruple, Triples and Indirect triples, Code Generation: Issues in the design of

code generator, Basic block and flow graphs, Register allocation, and assignment, DAG

representation of basic blocks, code generation using DAG.

2CSE702 - MACHINE LEARNING (NS)

Unit 2: Unsupervised Learning:

Clustering algorithms

Unit 3: Dimensionality Reduction

Introduction, Feature Selection and Feature Extraction, Principal Component Analysis, Decision Tree algorithms, Ensemble methods

Unit 4:Neural Network:

Neural Networks-Introduction, Perceptron Learning, Backpropagation,

Initialization,Training & Validation,ParameterEstimation-MLE, MAP, Bayesian Estimation.

Unit 5: Convolutional Neural Networks(CNN):Introduction, Convolutional Neural Network (ConvNet/CNN), Evolution and Convolution Operation in CNN, Architecture of CNN, ConvolutionLayer, Activation Function(ReLU), PoolingLayer, FullyConnectedLayer, Dropout

Unit 6: Sequential Networks: Sequence modeling using RNNs,  Backpropagation through time, Long Short-TermMemory(LSTM), Bidirectional LSTMs

2CSE709 - CLOUD SECURITY (IBM)

Identity and Access Management (IAM)

Identity and Access Management (IAM), IAM Operational Areas, Cloud Identity Management, Identity Provisioning in Cloud, Cloud Authentication, SAML, OAuth2.0, OpenID, Multi Factor authentication, Enterprise SSO and federation, Privileged Access Management (PAM), IBM Cloud App ID

Data Security

Data Security, protection and IBM key protect in IBM Cloud, Data Integrity in the Cloud, IBM Multi-Cloud Data Encryption,  Data in Transit, Protect Data in Transit, Certificate management, Digital certificates Encrypting data in transit

DevSecOps

Application Security, Secure DevOps,CIS Benchmark and PSIRT, IBM Cloud Pak for Security

2CSE710 - CLOUD COMPUTING ESSENTIALS ( CBA - PS)

Distributed File Systems & Programing:Distributed File Systems for Cloud, Map Reduce programing model, Google File Systems, Hadoop Distributed File System

Cloud Management:Messaging, Notification, Monitoring & Service Management, Disaster management, Migration Approaches & Algorithms, snapshotting techniques, Global Snapshot Algorithm, Chandy-Lamport Global Snapshot Algorithm

Edge Computing:Need and Model, Use cases, Drivers and Barriers, Edge Platforms & Computing Latency, Edge computing hardware architectures

2CSE70E19 - CLOUD COMPUTING ESSENTIALS ( BDA - PS)

Distributed File Systems & Programing:Distributed File Systems for Cloud, Map Reduce programing model, Google File Systems, Hadoop Distributed File System

Cloud Security:Identity & Access Management on Cloud, Understanding security, Issues of cloud security, Infrastructure security, Data Security, Access Management, Solutions

Edge Computing:Need and Model, Use cases, Drivers and Barriers, Edge Platforms & Computing Latency, Edge computing hardware architectures

2CSE70E16 - INTERNET OF THINGS ( PS )

Machine-to-Machine Communications:Definition of M2M, Applications of M2M, Key features of M2M, Architecture and components of M2M, Requirements for M2M, Issues/concerns in M2M, Standardization Efforts for M2M.

Cloud Interfacing:Arduino & Azure IoT Cloud & Architecture - Integrating IoT Devices with cloud and monitoring.

2CSE711 - ADVANCE BIG DATA ANALYTICS ( SGB )

Data Visualization tools and techniques

Tableau:

Data type, file type, tool type, show me menu, Type of data source supported by, how to connect different data sources, edit metadata, filter fields, filter data source, type of charts, filter data, add filter data, apply filter on chart and data, number functions, string functions, calculated fields, group, set, hierarchy, dashboard, storyboard.

NOSQL Databases

Types and importance of NoSQL Databases, MongoDB CRUD operations, Aggregation Framework, Index

2CSE712 - COGNITIVE COMPUTING (IBM)

COGNITIVE COMPUTING WITH INFERENCE AND DECISION SUPPORT SYSTEMS:

Intelligent Decision making, Fuzzy Cognitive Maps, learning algorithms: Nonlinear

Hebbian Learning, Data driven NHL, Hybrid learning, Fuzzy Logic, Fuzzy Grey Maps

COGNITIVE COMPUTING WITH MACHINE LEARNING:

 Machine learning Techniques for cognitive decision making, Hypothesis Generation and

Scoring, Natural Language Processing, Representing Knowledge, Taxonomies and

Ontologies, N-Gram models, Application

CASE STUDIES:

Cognitive Systems in health care, Cognitive Assistant for visually impaired – AI for

cancer detection, Predictive Analytics, Text Analytics, Image Analytics, Speech Analytics

– IBM Watson –

Introduction to IBM’s Power AI Platform - Introduction to Google’s TensorFlow

Development Environment

Misc:

Chatbots: Watson Assistant, Semantic Networks. Watson Services: (NLU), Watson Studio. NLP: SimpleRNN, Sentiment Analysis. Transfer Learning.

2CSE707 - CYBER FORENSICS ( RS )

  1. Cloud Forensics and Web Attack Forensics and Email Forensics

Introduction, Artifacts in Cloud Forensics, Challenges, Forensics as a service.

Intrusion forensics, database forensics, Preventive Forensics

  1. Solid State Device (SSD) Forensics

SSD Components, SSD concept, Forensics Analysis of an SSD

  1. Report Writing for High-Tech Investigation

Understanding and importance of Reports, Guidelines

2CSE708 - SECURITY INCIDENT & EVENT MANAGEMENT ( IBM )

Investigating the Events of an Offence, Using Asset Profiles to investigate Offences & Investigating offences triggered by Flows

Events, Asset Profiles, Flows and Investigating Offences

Using Rules and Using the Network Hierarchy

Navigate rules and rule groups, Locate the rules that fired for an event or flow, and triggered an offense, Investigate which test conditions caused a rule to fire, Investigate building blocks and function tests, Examine rule actions and responses, examine for which indicators anomaly detection rules can fire, Locate and explain the structure of the Network Hierarchy, Use networks in investigations, Use Flow Bias and Direction in investigations

Index and Aggregated Data Management, Dashboards and Reports

Index Management administration, Aggregated Data Management, Navigate the Dashboard tab, Customise dashboard items, Generating reports , Applying filters

2CSE70E25         - CYBER DEFENSE ( KDG )

Log Analysis

Data correlation, Operating system logs, Firewall logs, Web server logs, Log Management Infrastructure,

Detection Techniques

Honeypot Detection, Defending Against Fooling Attacks, Threats, Defending Against Denial of Service Attacks

Implementing data recovery and disaster management

Disaster recovery plan: The disaster recovery planning process, Forming a disaster recovery team, Performing risk assessment, Prioritizing processes and operations, Determining recovery strategies, Creating the disaster recovery plan, Testing the plan, Obtaining approval, Maintaining the plan, Challenges