Second Internal Exam Syllabus - November 2024
SEM - VII - B. TECH. CSE (CBA/CS/BDA)
2CSE701 - COMPILER DESIGN ( RLP ) |
UNIT-02 B1ottom-up parsing, operator precedence parsing, LR parsers (SLR,LALR, LR), Parser generation. UNIT-03 Syntax Directed Translation & Run Time Environment: Syntax Directed Definitions, Evaluation Orders for Syntax Directed Definitions, Type Checking, storage organization, Storage allocation strategies, Symbol table, Error Detection & Recovery. UNIT-04 Intermediate Code Generation & Code Generation: Different Intermediate Forms - Abstract Syntax tree, Polish Notation, 3 address code, Implementation of 3 address code-Quadruple, Triples and Indirect triples, Code Generation: Issues in the design of code generator, Basic block and flow graphs, Register allocation, and assignment, DAG representation of basic blocks, code generation using DAG. |
2CSE702 - MACHINE LEARNING (NS) |
Unit 2: Unsupervised Learning: Clustering algorithms Unit 3: Dimensionality Reduction Introduction, Feature Selection and Feature Extraction, Principal Component Analysis, Decision Tree algorithms, Ensemble methods Unit 4:Neural Network: Neural Networks-Introduction, Perceptron Learning, Backpropagation, Initialization,Training & Validation,ParameterEstimation-MLE, MAP, Bayesian Estimation. Unit 5: Convolutional Neural Networks(CNN):Introduction, Convolutional Neural Network (ConvNet/CNN), Evolution and Convolution Operation in CNN, Architecture of CNN, ConvolutionLayer, Activation Function(ReLU), PoolingLayer, FullyConnectedLayer, Dropout Unit 6: Sequential Networks: Sequence modeling using RNNs, Backpropagation through time, Long Short-TermMemory(LSTM), Bidirectional LSTMs |
2CSE709 - CLOUD SECURITY (IBM) |
Identity and Access Management (IAM) Identity and Access Management (IAM), IAM Operational Areas, Cloud Identity Management, Identity Provisioning in Cloud, Cloud Authentication, SAML, OAuth2.0, OpenID, Multi Factor authentication, Enterprise SSO and federation, Privileged Access Management (PAM), IBM Cloud App ID Data Security Data Security, protection and IBM key protect in IBM Cloud, Data Integrity in the Cloud, IBM Multi-Cloud Data Encryption, Data in Transit, Protect Data in Transit, Certificate management, Digital certificates Encrypting data in transit DevSecOps Application Security, Secure DevOps,CIS Benchmark and PSIRT, IBM Cloud Pak for Security |
2CSE710 - CLOUD COMPUTING ESSENTIALS ( CBA - PS) |
Distributed File Systems & Programing:Distributed File Systems for Cloud, Map Reduce programing model, Google File Systems, Hadoop Distributed File System Cloud Management:Messaging, Notification, Monitoring & Service Management, Disaster management, Migration Approaches & Algorithms, snapshotting techniques, Global Snapshot Algorithm, Chandy-Lamport Global Snapshot Algorithm Edge Computing:Need and Model, Use cases, Drivers and Barriers, Edge Platforms & Computing Latency, Edge computing hardware architectures |
2CSE70E19 - CLOUD COMPUTING ESSENTIALS ( BDA - PS) |
Distributed File Systems & Programing:Distributed File Systems for Cloud, Map Reduce programing model, Google File Systems, Hadoop Distributed File System Cloud Security:Identity & Access Management on Cloud, Understanding security, Issues of cloud security, Infrastructure security, Data Security, Access Management, Solutions Edge Computing:Need and Model, Use cases, Drivers and Barriers, Edge Platforms & Computing Latency, Edge computing hardware architectures |
2CSE70E16 - INTERNET OF THINGS ( PS ) |
Machine-to-Machine Communications:Definition of M2M, Applications of M2M, Key features of M2M, Architecture and components of M2M, Requirements for M2M, Issues/concerns in M2M, Standardization Efforts for M2M. Cloud Interfacing:Arduino & Azure IoT Cloud & Architecture - Integrating IoT Devices with cloud and monitoring. |
2CSE711 - ADVANCE BIG DATA ANALYTICS ( SGB ) |
Data Visualization tools and techniques Tableau: Data type, file type, tool type, show me menu, Type of data source supported by, how to connect different data sources, edit metadata, filter fields, filter data source, type of charts, filter data, add filter data, apply filter on chart and data, number functions, string functions, calculated fields, group, set, hierarchy, dashboard, storyboard. NOSQL Databases Types and importance of NoSQL Databases, MongoDB CRUD operations, Aggregation Framework, Index |
2CSE712 - COGNITIVE COMPUTING (IBM) |
COGNITIVE COMPUTING WITH INFERENCE AND DECISION SUPPORT SYSTEMS: Intelligent Decision making, Fuzzy Cognitive Maps, learning algorithms: Nonlinear Hebbian Learning, Data driven NHL, Hybrid learning, Fuzzy Logic, Fuzzy Grey Maps COGNITIVE COMPUTING WITH MACHINE LEARNING: Machine learning Techniques for cognitive decision making, Hypothesis Generation and Scoring, Natural Language Processing, Representing Knowledge, Taxonomies and Ontologies, N-Gram models, Application CASE STUDIES: Cognitive Systems in health care, Cognitive Assistant for visually impaired – AI for cancer detection, Predictive Analytics, Text Analytics, Image Analytics, Speech Analytics – IBM Watson – Introduction to IBM’s Power AI Platform - Introduction to Google’s TensorFlow Development Environment Misc: Chatbots: Watson Assistant, Semantic Networks. Watson Services: (NLU), Watson Studio. NLP: SimpleRNN, Sentiment Analysis. Transfer Learning. |
2CSE707 - CYBER FORENSICS ( RS )
Introduction, Artifacts in Cloud Forensics, Challenges, Forensics as a service. Intrusion forensics, database forensics, Preventive Forensics
SSD Components, SSD concept, Forensics Analysis of an SSD
Understanding and importance of Reports, Guidelines |
2CSE708 - SECURITY INCIDENT & EVENT MANAGEMENT ( IBM ) |
Investigating the Events of an Offence, Using Asset Profiles to investigate Offences & Investigating offences triggered by Flows Using Rules and Using the Network Hierarchy Index and Aggregated Data Management, Dashboards and Reports |
2CSE70E25 - CYBER DEFENSE ( KDG ) |
Log Analysis Data correlation, Operating system logs, Firewall logs, Web server logs, Log Management Infrastructure, Detection Techniques Honeypot Detection, Defending Against Fooling Attacks, Threats, Defending Against Denial of Service Attacks Implementing data recovery and disaster management Disaster recovery plan: The disaster recovery planning process, Forming a disaster recovery team, Performing risk assessment, Prioritizing processes and operations, Determining recovery strategies, Creating the disaster recovery plan, Testing the plan, Obtaining approval, Maintaining the plan, Challenges |