0% found this document useful (0 votes)
127 views17 pages

Syllabus CSBS VI Sem

The document outlines the syllabus for the VI Semester B.Tech Computer Science and Business System (CSBS) program at RGPV, Bhopal, covering five core subjects: Computer Networks, Information Security, Artificial Intelligence, Financial & Cost Accounting, and Business Communication & Value Science. Each subject includes detailed units, suggested experiments, textbooks, reference books, and course outcomes that define the skills and knowledge students are expected to acquire. The curriculum emphasizes practical applications and theoretical foundations in technology and business communication.

Uploaded by

Kundan Bharti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
127 views17 pages

Syllabus CSBS VI Sem

The document outlines the syllabus for the VI Semester B.Tech Computer Science and Business System (CSBS) program at RGPV, Bhopal, covering five core subjects: Computer Networks, Information Security, Artificial Intelligence, Financial & Cost Accounting, and Business Communication & Value Science. Each subject includes detailed units, suggested experiments, textbooks, reference books, and course outcomes that define the skills and knowledge students are expected to acquire. The curriculum emphasizes practical applications and theoretical foundations in technology and business communication.

Uploaded by

Kundan Bharti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL

New Scheme Based on AICTE Flexible Curricula


[Link] Computer Science and Business System (CSBS)
Syllabus VI Semester
CB601 (Computer Network)
Unit-I Fundamentals and Physical Layer: Introduction, Computer networks and distributed
systems, Classifications of computer networks, Preliminaries of layered network structures. Data
communication components: Representation of data and its flow, various connection topology,
Protocols and standards, OSI model, Transmission Media. LAN: Wired LAN, Wireless LAN,
Virtual LAN. Techniques for Bandwidth utilization: Multiplexing - Frequency division, Time
division and Wave division, Concepts on spread spectrum.

Unit-II Data Link Layer and Medium Access Sub Layer: Fundamentals of Error Detection
and Error Correction, Block coding, Hamming Distance, CRC, Flow Control and Error control
protocols - Stop and Wait, Go-back–N ARQ, Selective Repeat ARQ, Sliding Window,
Piggybacking, Random Access, Multiple access protocols -Pure ALOHA, Slotted ALOHA,
CSMA/CD, CDMA/CA.

Unit-III Network Layer: Switching, Logical addressing – IPV4, IPV6, Address mapping –
ARP, RARP, BOOTP and DHCP–Delivery, Forwarding and Unicast Routing protocols.

Unit-IV Transport Layer: Process to Process Communication, User Datagram Protocol (UDP),
Transmission Control Protocol (TCP), SCTP Congestion Control, Quality of Service (QoS), QoS
improving techniques - Leaky Bucket and Token Bucket algorithms.

Unit-V Application Layer And Security: Application Layer: DNS, DDNS, TELNET, EMAIL,
FTP, WWW, HTTP, SNMP, Bluetooth, Firewalls.
Network Security: Electronic mail, Directory services, network management, Basic concepts of
Cryptography.

Suggested List of Experiments:


1. Learn to use basic commands.
2. Configuration of Network in Linux Environment.
3. Assignment of IP Address to computers.
4. Implementation of Subnet mask in IP addressing.
5. Implementation of setup of a Local Area Network (using Switches) – Minimum 3 nodes
and Internet.
6. To capture, save, and analyse network traffic on TCP / UDP / IP / HTTP / ARP /DHCP
/ICMP /DNS using Wireshark Tool.
7. Write a socket PING program to test the server connectivity.
8. Study of socket programming and client server model using TCP and UDP.
9. Programs using TCP Sockets (like date and time server & client, echo server & client, chat
etc.)
10. Programs using UDP Sockets (like echo server, chat, simple DNS).
11. Simulation of sliding window.
SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL
New Scheme Based on AICTE Flexible Curricula
[Link] Computer Science and Business System (CSBS)
12. Implementation of ARP.

Text Books:
1. Andrew S. Tanenbaum and David J. Wetherall, “Computer Networks”, 5th Edition, Pearson
Education.
2. William Stallings, “Data and Computer Communication”, 10th Edition, Pearson education.

Reference Books:
1. Kaufman, R. Perlman and M. Speciner, “Network Security”, Pearson education.
2. W. Richard Stevens, “UNIX Network Programming”, Vol. 1,2 & 3, Prentice-Hall of India.

Online Resources:
1. [Link]
2. [Link]
part-1- a93b0ca69d36

Course Outcomes:
After completion of this course, the students will be able to:
CO1: Choose the required functionality at each layer for given application.
CO2: Trace the flow of information from one node to another node in the network.
CO3: Apply the knowledge of addressing scheme and various routing protocols in data
communication to select optimal path.
CO4: Monitor the traffic within the network and analyze the transfer of packets.
CO5: Develop real time applications of networks using socket programming.
SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL
New Scheme Based on AICTE Flexible Curricula
[Link] Computer Science and Business System (CSBS)
Syllabus VI Semester
CB602 (Information Security)
Unit-I Overview of Computer Security: The Basic Components- Confidentiality, integrity
and availability; Security policy and procedure; Assumptions and Trust; Security Assurance,
Implementation and operational issues; Security Life Cycle -Access Control Models: Role
based Model.

Unit-II Security Policies and System Design: Types of Security Policies-Confidentiality


policies: Goals of Confidentiality Policies, The Bell-LaPadula Model- Integrity policies: Biba
Integrity Model, Clark-Wilson Integrity Model -Hybrid policies: Chinese Wall Model, Clinical
Information Systems Security Policy. Access Control Mechanisms: Access Control Lists-
Information Flow: Compiler-Based Mechanisms, Execution-Based Mechanisms- Confinement
Problem: Isolation, Covert Channels- Assurance: Building Secure and Trusted Systems-
Evaluating Systems: Goals of Formal Evaluation.

Unit-III System Security: Malicious Logic: Trojan Horses, Computer Viruses, Computer
Worms- Vulnerability Analysis: Penetration Studies, Vulnerability Classification-Auditing:
Anatomy of an Auditing System, Auditing Mechanisms, Audit Browsing- Intrusion Detection:
Architecture, Organization of Intrusion Detection Systems- Design Principles- Representing
Identity: Files and Objects, Users, Groups and Roles, Naming and Certificates.

Unit-IV Applications: Network Security: Policy Development, Network Organization-


System Security: Policy- User Security: Policy, Access, Files and Devices- Program Security:
Requirements and Policy, Design, Case Study: Common Security-Related Programming
Problems.

Unit-V Operating System and Database Security: Operating System Security: Security
Architecture, Analysis of Security in Linux/Windows-Database Security: Security
Architecture, Database Auditing-Case Study: Discretionary Access Control.

Suggested List of Experiments:


1. Analysis of security in Unix/Linux.
2. Administration of users, password policies, privileges and roles.
3. Implementation of discretionary access control and mandatory access control.
4. Demonstrate intrusion detection system (ids) using any tool Eg. Snort or any other
software.
5. Implementation of IT audit, malware analysis and vulnerability assessment and generate the
report.
6. Implementation of mobile audit and generate the report of the existing artifacts.
7. Implementation of OS hardening and RAM dump analysis to collect the artifacts and other
information.
8. Implementation of digital forensics tools for disk imaging, data acquisition, data extraction
SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL
New Scheme Based on AICTE Flexible Curricula
[Link] Computer Science and Business System (CSBS)
and data analysis and recovery.
9. Perform mobile analysis in the form of retrieving call logs, SMS log, all contacts list using
the forensics tool like SAFT.
10. Implementation to identify web vulnerabilities, using OWASP project.

Text Books:
1. Ross Anderson, “Security Engineering: A Guide to Building Dependable Distributed
Systems”, Third Edition, Wiley.
2. M. Bishop, “Computer Security: Art and Science”, 2nd Edition, Pearson Education.
3. M. Stamp, “Information Security: Principles and Practice”, 2nd Edition, Wiley.

Reference Books:
1. C.P. Pfleeger, S.L. Pfleeger, J. Margulies, “Security in Computing”, 5th Edition, Prentice
Hall.
2. David Wheeler, “Secure Programming HOW TO”.
3. Michael Zalewski, “Browser Security Handbook”, Google Inc.
4. M. Gertz, S. Jajodia, “Handbook of Database Security”, Springer.

Course Outcomes:
After completion of this course, the students will be able to:
CO1: Discuss the basics of information security and international standards.
CO2: Analyze information security policy and system design.
CO3: Comprehend system level security.
CO4: Apply system level security in various environments.
CO5: Analyze the operating system and database security methods.
SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL
New Scheme Based on AICTE Flexible Curricula
[Link] Computer Science and Business System (CSBS)
Syllabus VI Semester

CB603 (Artificial Intelligence)

Unit-I Introduction to Artificial Intelligence and Problem-Solving Agent: Intelligent


agents, agents & environment, nature of environment, structure of agents, goal-based agents,
utility-based agents, learning agents. Problems of AI, AI technique, Tic - Tac - Toe problem,
Defining the problem as state space search, production system, problem characteristics, and
issues in the design of search programs.

Unit-II Search Techniques: Problem solving agents, searching for solutions; uniform
search strategies: breadth first search, depth first search, depth limited search, bidirectional
search, comparing uniform search strategies. Heuristic search strategies – Greedy best-first
search, A* search, AO* search, memory bounded heuristic search: local search algorithms
& optimization problems: Hill climbing search, simulated annealing search, local beam
search.

Unit-III Constraint Satisfaction Problems and Game Theory: Local search for constraint
satisfaction problems. Adversarial search, Games, optimal decisions & strategies in games,
the minimax search procedure, alpha-beta pruning, additional refinements, iterative
deepening.

Unit-IV Knowledge & Reasoning: Knowledge representation issues, representation &


mapping, approaches to knowledge representation, Using predicate logic, representing
simple fact in logic, representing instant & ISA relationship, computable functions &
predicates, resolution, natural deduction. Representing knowledge using rules, Procedural
verses declarative knowledge, logic programming, forward verses backward reasoning,
matching, control knowledge.

Unit-V Probabilistic Reasoning and Expert Systems: Representing knowledge in an


uncertain domain, the semantics of Bayesian networks, Dempster-Shafer theory, Planning
Overview, components of a planning system, Goal stack planning, Hierarchical planning,
other planning techniques.
Expert Systems: Representing and using domain knowledge, expert system shells, and
knowledge acquisition.

Suggested List of Experiments:


1. Programs on Problem Solving
a. Write a program to solve 8 Queens problem.
b. Solve any problem using depth first search.
c. Implement MINIMAX algorithm.
d. Implement A* algorithm.
2. Programs on Decision Making and Knowledge Representation
a. Introduction to PROLOG.
SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL
New Scheme Based on AICTE Flexible Curricula
[Link] Computer Science and Business System (CSBS)
b. Implementation of Unification and Resolution Algorithm.
c. Implementation of Backward Chaining.
3. Programs on Planning and Learning.
a. Implementation of Blocks World program.
b. Implementation of SVM for an application using python.
c. Implementing Artificial Neural Networks for an application using python.
d. Implementation of Decision Tree.
e. Implementation of K-mean algorithm.

Text Books:
1. Stuart J. Russell, Peter Norwig, “Artificial Intelligence –A Modern approach”, 3rd
Edition Pearson Education.
2. K. R. Chowdhary, “Fundamentals of Artificial Intelligence”, Springer.

Reference Books:
1. Ritch & Knight, ”Artificial Intelligence”, Third Edition, Tata McGraw Hill.
2. Patterson, “Introduction to Artificial Intelligence & Expert Systems”, First Edition,
Pearson.
3. Saroj Kaushik, “Logic & Prolog Programming”, First Edition, New Age International.
4. Joseph C. Giarratano, Gary D. Riley, ”Expert Systems: Principles and Programming”,
Fourth Edition”, Cengage.

Course Outcomes:
After completion of this course, the students will be able to:
CO1: Define basic concepts of Artificial Intelligence.
CO2: Explain knowledge representation.
CO3: Understand basic concepts of probabilistic reasoning.
CO4: Recognize techniques used in game playing.
CO5: Compare various machine learning models.
SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL
New Scheme Based on AICTE Flexible Curricula
[Link] Computer Science and Business System (CSBS)
Syllabus VI Semester
CB604 Financial & Cost Accounting
Unit-I Accounting Concept: Introduction, Techniques and Conventions, Financial
Statements- Understanding & Interpreting Financial Statements. Company Accounts and
Annual Reports- Audit Reports and Statutory Requirements, Directors Report, Notes to
Accounts, Pitfalls.

Unit-II Accounting Process: Book Keeping and Record Maintenance, Fundamental


Principles and Double Entry, Journal, Ledger, Trial Balance, Balance Sheet, Final Accounts
,Cash Book and Subsidiary Books, Rectification of Errors.

Unit-III Financial Statements: Form and Contents of Financial Statements, Analyzing and
Interpreting Financial Statements, Accounting Standards.
Class Discussion: Corporate Accounting Fraud- A Case Study of Satyam.

Unit-IV Cash Flow and Fund Flow Techniques: Introduction, How to prepare – Cash
flow and Fund flow, Difference between them.

Unit-V Costing Systems: Elements of Cost, Cost Behavior, Cost Allocation, Overhead
Allocation, Unit Costing, Process Costing, Job Costing, Absorption Costing, Marginal Costing,
Cost Volume Profit Analysis, Budgets, ABC Analysis.
Class Discussion: Application of costing concepts in the service sector.

Text Books:
1. Robert N Anthony, David Hawkins, Kenneth Marchant, “Accounting: Texts and Cases”,
Thirteenth Edition, McGraw-Hill.
2. [Link] & [Link], “Management Accounting”, Tata McGraw Hill.
3. [Link], “Financial Accounting – A Managerial Perspective”, Fifth Edition, PHI
Learning, New Delhi.

Reference Books:
1. Jan Williams, “Financial and Managerial Accounting – The basis for business Decisions”,
Fifteenth Edition, Tata McGraw Hill Publishers.
2. Horngren, Surdem, Stratton, Burgstahler, Schatzberg, “Introduction to Management
Accounting”, Sixteenth Edition, PHI Learning.

Course Outcomes:
On completion of the course, the students will be able to:
CO1: Understand the concept of Financial Accounting.
CO2: Discuss about the importance and usefulness of the accounting concepts and their
managerial implications.
CO3: Develop an understanding of the financial statements and the underlying principles and
learn to interpret financial statements.
CO4: Understand the concept of Cash flow and Fund flow of an organization.
CO5: Understand cost accounting, different types of costing and cost management.
SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL
New Scheme Based on AICTE Flexible Curricula
[Link] Computer Science and Business System (CSBS)
Syllabus VI Semester
CB605 (Business Communication & Value Science-IV)

Unit-I Communicative Writing: Concepts: Principles of Communicative writing – Formal


Business letters – Writing Proposals – Use of charts in communicative writing – use of
business idioms – corporate terms. Activity: Group business proposals – presentation of
proposal – Story telling using charts and graphs (demonstrative speech).

Unit-II Emotional Intelligence: Concepts: Concepts of emotional intelligence – Its


importance in human life and professional life – difference between Emotional quotient and
Intelligent quotient – Corporate etiquette Activity: Any two Anubhaav activities – 10 ways
to build Emotional Intelligence by Daniel Goleman – Mock interview.

Unit-III Conflict Management: Concepts: Conflicts – Corporate and workplace conflicts –


reason and impacts of conflicts – guidelines to manage conflicts. Teams - role of team
player – stress – stress management – importance of feedbacks – Time Management.
Activity: Creating posters with stress management tips – open house discussion on
challenges of time management –Tracking time activity.

Unit-IV Corporate Social Responsibility: Concepts: Corporate Social Responsibility -


Social responsibilities of companies - Diversity in workplace – Individual social
responsibility – Social connect – life skills – empathy. Activity: Discussion & Role play in
diversity – Ubuntu story of social responsibility – creating audio embedded PPT on the
concept of social responsibility.

Unit-V Design Thinking & Public Speaking: Concepts: Design thinking – importance of
start-ups – Proof of concept for start-ups – Best practices – Art of Public speaking Activity:
Pitch in start-up idea – watching videos of public speaking – Finding similarities among
world famous speeches – watching videos of Sw. Vivekananda’s speech – Martin Luther
King’s My Dream speech.

Suggested List of Experiments:


1. Write formal business letter for proposal of goods item.
2. Create a presentation based on business proposal.
3. Perform activities to test IQ.
4. Perform activities to build emotional intelligence.
5. Create posters based on social issues.
6. Create a presentation based on social issues and our responsibility.
7. Create a presentation based on new startup idea.
8. Perform an activity based on public speaking.
9. Perform group discussion on current social issues.

Text Books:
SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL
New Scheme Based on AICTE Flexible Curricula
[Link] Computer Science and Business System (CSBS)
1. Daniel Goleman, “Emotional Intelligence: Why it Can Matter More Than IQ”,
Bloomsbury.
2. Ryback David, “Putting Emotional Intelligence To Work”, CRC Press.

Reference Books:
3. Dale Carnegie, “How to Develop Self Confidence and Improve Public Speaking -
Time - Tested Methods of Persuasion”, Ebury Publishing.
4. Chris Anderson, “TED Talks: The official TED guide to public speaking: Tips and
tricks for giving unforgettable speeches and presentations”, Hachette.

Course Outcomes:
On completion of the course, the students will be able to:
CO1: Recognize the best practice of Communicative writing.
CO2: Apply emotional intelligence in real life scenarios.
CO3: Identify the best practices of stress management.
CO4: Recognize the attributes needed to function and grow in a corporate environment.
CO5: Apply the best practices of public speaking.
SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL
New Scheme Based on AICTE Flexible Curricula
[Link] Computer Science and Business System (CSBS)
Syllabus VI Semester
CB606 (A) (Robotics and Embedded Systems)
Unit-I Introduction to Modern Day Robotics and their Industrial Applications:
Industry 4.0 Concept: Background and Overview-Industry 4.0 technologies:
implementation patterns in manufacturing companies-Evolution of Industrial Robots and
their Applications-Advancements in Robotics and Its Future Uses-Types of robotics in
various fields for applications.
Technologies essential for Cognitive Robotics: Computer systems and Technologies
relevant to modern day robotics- Robotic Process Automation: Overview of RPA and its
applications-RPA, AI, and Cognitive Technologies for Leaders- Introduction to Robotics:
Analysis, Control, Applications.

Unit-II Basics of Robotic Operating System: Basics of Robotic operating System: ROS
for beginners an overview- Introduction to the Robot Operating System (ROS) Middleware
- Secure communication for the Robot Operating System - An Introduction to Robot
Operating System: The Ultimate Robot Application Framework by Adnan.
Quality of Service and Cybersecurity Communication Protocols -Analysis for the Robot
Operating System Robotics systems communication- Threat modelling using ROS.
Towards cloud robotic system: A case study of online co-localization for fair resource
competence-A Case Study on Model-Based Development of Robotic Systems using Monti
Arc with Embedded Automata.

Unit-III AI in the Context of Cognitive Robotics and Role of AI in Robotics: Foundation


for Advanced Robotics and AI- A Concept for a Practical Robot Design Process- Demo to
train A Robot Using AI - Deep learning core applications-Deep learning business
applications.
Introduction to computer vision and application of Vision Systems in Robotics: Concepts of
computer vision and the how vision systems are becoming essential part of Robotics-
Computer Vision: Models, Learning, and Inference - Mastering Computer Vision with
TensorFlow 2.x: Build advanced computer vision applications using machine learning and
deep learning techniques- Machine Vision Applications- Application areas for vision
systems-Robot inspection case study-Autonomous driving using 3D imaging case study.

Unit-IV Data Science and Big Data in the Context of Cognitive Robotics: Cognitive
Technologies: The Next Step Up for Data and Analytics in robotics-Cognitive Deep
Learning Technology for Big Data Cognitive Assistant Robots for Reducing Variability in
Industrial Human-Robot Activities.
Introduction to Python and R Programming in the context of Robotics: Introduction to
Python - Python Functions for Data Science-Basic ROS Learning Python for robotics- An
introduction to R -The R in Robotics rosR: A New Language Extension for the Robot
Operating System.
Artificial Intelligence and Robotics - The Review of Reliability Factors Related to Industrial
Robots -Failure analysis of mature robots in automated production- Data Analytics for
SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL
New Scheme Based on AICTE Flexible Curricula
[Link] Computer Science and Business System (CSBS)
Predictive Maintenance of Industrial Robots - Failure Is an Option: How the Severity of
Robot Errors Affects Human-Robot Interaction.

Unit-V Concepts of Cloud Computing, Cloud Platforms and its Applications in


Robotics: Learning Cloud Computing: Core Concepts - Cloud Computing: Private Cloud
Platforms -Robot as a Service in Cloud Computing -Cloud Computing Technology and Its
Application in Robot Control - A Comprehensive Survey of Recent Trends in Cloud,
Robotics Architectures and Applications - Google's cloud robotics and high computing
needs of industrial automation and systems-The role of cloud and opensource software in
the future of robotics-The Power of Cloud Robotics by Robotics Industry Association.

Suggested List of Experiments:


1. Build a Self-Driving Robot that can automatically follow a line
2. Build a basic obstacle-avoiding robot and improve the design to help it avoid getting stuck
3. Build a Humanoid Robot
4. Autonomous Robot Navigation using Computer Vision for exhaustive path-finding
5. A Mobile Autonomous Chemical Detecting Robot
6. Build a voice controlled robot
7. Web-Controlled Mobile Video-Enabled Robotic Litter Collection Device
8. Utilizing Artificial Neural Networks to Create a Learning Robot
9. Hospital Sanitizing Robot
10. Autonomous Robotic Vehicle: Saving lives, preventing accidents one at a time
11. Build a robot with Python and 3D Printed Robotic Arm
12. Build an Intelligent Irrigation Control System
13. AI-powered Hearing Aid
14. Fire Extinguishing Robot
15. Remote Operated Spy Robot Circuit

Text Books:
1. Saeed Benjamin Niku, “Introduction to Robotics: Analysis, Control, Applications”, 2nd
Edition Wiley Publishers.
2. Simon J. D. Prince, “Computer Vision: Models, Learning, and Inference”, Cambridge
University Press.
3. Francis X. Govers,” Artificial Intelligence for Robotics: Build Intelligent Robots that
Perform Human Tasks Using AI Techniques”, Packt publishing.

Reference Books:
1. Krishnendu Kar, “Mastering Computer Vision with TensorFlow 2.x: Build Advanced
Computer Vision Applications Using Machine Learning and Deep Learning Techniques”,
Packt publishing.
2. Armando Vieira, Bernardete Ribeiro,” Introduction to Deep Learning Business Applications
for Developers from Conversational Bots in Customer Service to Medical Image processing”,
Apress.
3. Steve Heath, "Embedded System Design 2nd Edition", EDN Series for Design Engineers.
SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL
New Scheme Based on AICTE Flexible Curricula
[Link] Computer Science and Business System (CSBS)
Course Outcomes:
CO1: Develop skills of using advanced software for solving practical problems in robotics
pertaining to various industries.
CO2: Understand the basics of Robotic operating systems and communication system.
CO3: Understand basic concepts and technological advancements in AI and robotics.
CO4: Understand and apply several statistical analysis techniques, business analytics for
cognitive robotics and programming of robots using python and R languages.
CO5: Understand and apply the cloud computing concepts in robotics.
SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL
New Scheme Based on AICTE Flexible Curricula
[Link] Computer Science and Business System (CSBS)
Syllabus VI Semester
CB606 (B) (Modern Web Applications)
Unit-I Introduction to Internet & World Wide Web: History of the Internet & World-
Wide Web, Web Browsers, Web Servers, Uniform Resource Locator, Tools and Web
Programming Languages. Web Standards, Categories of Web Applications, Characteristics
of Web Applications, Tered Architecture.

Unit-II Hypertext Markup Language (HTML) and Cascading Style Sheets (CSS):
HTML: Basic HTML page, Text Formatting, Table, Headers, Linking, Images, List, Meta
Elements.
CSS: Inline, Internal and External Style Sheet, Bootstrap-CSS Text, CSS forms, CSS
components drop down.

Unit-III JavaScript and Extensible Markup Language(XML):


JavaScript: Introduction to Java Scripts, Objects in Java Script, Dynamic HTML with Java
Script, Bootstrap- JS Alert, JS Button, JS popover.
XML: Introduction, Structuring Data, Document Type Definition, XML Vocabularies,
Document Object Model (DOM) with JavaScript, Extensible Stylesheet Language
Transforms (XSL).

Unit-IV PHP Basics: Writing Basic PHP Programs: Creating PHP Programs, Numbers and
Strings, Literals and Variables, Operators and Functions.
Form & PHP: Creating Form Controls, Using Values Returned From, Forms Using PHP.

Unit-V PHP Database Connectivity: PHP Database Connectivity: Connecting to MySQL


Server, Selecting Databases, Checking for Errors, Closing the MySQL Server Connection.
Manipulating Data in MySQL Using PHP: Inserting, Viewing, Updating and Deleting
Records, Manipulating joined tables, User Authentication: Creating Session, Authorization
Level.

Suggested List of Experiments:


1. Create a HTML page with frames, links, tables and other tags for highlighting the facilities in
the Department in your College. State the assumptions you make (business logic you are
taking into consideration).
2. Create a web page with the following using HTML:
a. To embed a map in a web page.
b. To fix the hot spots in that map.
c. Show all the related information when the hot spots are clicked.
d. Embed an image map picture (India map) on a Web page that provides different links to
other Web pages (different states) and show the all the related information depending
on where a user clicks on the image.
e. Create a webpage to embed a human body image, identify and display all the related
SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL
New Scheme Based on AICTE Flexible Curricula
[Link] Computer Science and Business System (CSBS)
information about the human body parts (head, eye, nose, finger etc.) based on the user
clicks on the human body image map.
3. Create a web page with the following:
a. Cascading style sheets.
b. Embedded style sheets.
c. Inline style sheets.
d. Use your college information for the web pages.
4. Create a User Registration form with First Name, Last name, Address, City, State,
Country, Pincode, Username and Password fields for a General login webpage and satisfy
the following criteria:
a. Create a validate() function that does the following:
b. Checks that the First Name, Last Name, City, Country, Username, and Password fields
are filled out.
c. Checks that the Pincode is exactly 6 numeric.
d. Checks that the state is exactly two characters.
e. Checks that the email is a valid email address.
i. false if email has fewer than 6 characters
ii. false if email does not contain an @ symbol
iii. false if email does not contain a period (.)
iv. true otherwise
5. Write a DTD for a XML document that declares an address book containing contacts.
Each contact has a name and address. An address should contain attributes for street name,
state and phone number. Write a XML document and validate it against this DTD.
6. Create and save a XML document at the server, which contains 10 users information.
Write a Program, which takes user Id as an input and returns the user details by taking the
user information from the XML document.
7. Create a XML to represent the BOOKS catalog that has the following elements (TITLE,
ISBN NO, AUTHOR, PUBLISHER, and PRICE). Display the book details styled with
XSLT.
8. Create an Extensible markup language to represent the students mark information of a
class. Create a webpage to display all the students consolidated mark statement with pass
(green color) or fail (red color) using XSLT.
9. Write programs in PHP to create three-tier applications:
a. for conducting on-line examination.
b. for displaying student mark list. Assume that student information is available in a
database which has been stored in a database server.
10. Session tracking using hidden form fields and Session tracking for a hit count.
11. Convert the static webpages of programs 1 to 4 into dynamic web pages using PHP and
cookies. Hint: Users information (user id, password, credit card number) would be stored
in [Link].
12. Write a PHP program for Employee Details which includes EmpID, Name, Designation,
Salary, DOJ, etc., to connect with the database and execute queries to retrieve and update
data. Prepare the report for single and group of employees based on the end user needs.
13. Consider a Library Management System. Develop a JavaScript program that will validate
the controls in the forms you have created for the application. State the assumptions you
SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL
New Scheme Based on AICTE Flexible Curricula
[Link] Computer Science and Business System (CSBS)
make (business logic you are taking into consideration). Note: Your application must
access a database using PHP.

Text Books:

1. Deitel P. J., Deitel H. M. and Deitel A., “Internet and World Wide Web: How to Program”,
Fifth Edition, Pearson Prentice Hall.
2. Jon Duckett, “HTML & CSS: Design and Build Websites”, First Edition, John Wiley &
Sons.
3. Naramore E., Gerner J., Scouarnec Y.L., et al., “Beginning PHP5, Apache, MySQL Web
Development: Programmer to Programmer”, John Wiley & Sons Inc.

Reference Books:
1. Sebesta R. W.,” Programming the World Wide Web”, Eight Edition, Pearson.
2. Pressman R. and Lowe D.,” Web Engineering: a practitioner's approach”, First Edition, Mc
GrawHill.
3. Kappel G., et al.,” Web Engineering: The Discipline of systematic Development of Web
Applications”, First Edition, John Wiley & Sons.
4. Suh W., “Web Engineering: Principles and Techniques”, Idea Group Inc.
5. Ullman L ,” PHP for the Web: Visual Quick Start Guide”, Fifth Edition, Peach pit Press.

Course Outcomes:
On completion of the course, the students will be able to
CO1: Construct a basic website using HTML and Cascading Style Sheets.
CO2: Build dynamic web page with validation using Java Script objects and by applying
different event handling mechanisms.
CO3: Construct simple web pages in PHP and to represent data in XML format.
CO4: Design and implement server side programs using PHP.
CO5: Do database manipulation using MySQL and authenticate data.
SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL
New Scheme Based on AICTE Flexible Curricula
[Link] Computer Science and Business System (CSBS)
Syllabus VI Semester
CB606 (C) (Data Mining and Analytics)
Unit-I Introduction and Knowledge Representation: Introduction - Related technologies
- Machine Learning, DBMS, OLAP, Statistics, Stages of the Data Mining Process, Data
Mining Techniques, Knowledge Representation Methods, Task relevant data, Background
knowledge, Representing input data and output knowledge, Visualization techniques,
Applications.

Unit-II Data Preprocessing: Data preprocessing: Data cleaning, Data transformation, Data
reduction, Discretization and generating concept hierarchies. Attribute-oriented analysis:
Attribute generalization, Attribute relevance, Class comparison, Statistical measures.

Unit-III Association and Mining Methods: Association rules: Motivation and


terminology, Basic idea: item sets, Generating item sets and rules efficiently, Correlation
analysis. Classification: Basic learning/mining tasks, Inferring rudimentary rules: 1R,
algorithm, Decision trees, covering rules. Prediction: The prediction task, Statistical
(Bayesian) classification, Bayesian networks, Instance- based methods (nearest neighbor),
linear models.

Unit-IV Linear and Non-Linear Models: Descriptive analytics: Data Modeling, Trend
Analysis, Simple Linear Regression Analysis Forecasting models: Heuristic methods,
predictive modeling and pattern discovery, Logistic Regression: Logit transform, ML
estimation, Tests of hypotheses, Wald test, LR test, score test, test for overall regression,
multiple logistic regression, forward, backward method, interpretation of parameters,
relation with categorical data analysis, Interpreting Regression Models, Implementing
Predictive Models.
Generalized Linear model: Link functions such as Poisson, binomial, inverse binomial,
inverse Gaussian, Gamma. Non Linear Regression (NLS): Linearization transforms, their
uses & limitations, examination of non-linearity, initial estimates, iterative procedures for
NLS, grid search, Newton-Raphson, steepest descent, Marquardt’s methods. Introduction to
semiparametric regression models, additive regression models. Introduction to
nonparametric regression methods

Unit-V Time Series Analysis: Auto - Covariance, Auto-correlation and their properties.
Exploratory time series analysis, Test for trend and seasonality, Exponential and moving
average smoothing, Holt – Winter smoothing, forecasting based on smoothing.
Linear time series models: Autoregressive, Moving Average, Autoregressive Moving
Average and Autoregressive Integrated Moving Average models; Estimation of ARIMA
models such as Yule-Walker estimation for AR Processes, Maximum likelihood and least
squares estimation for ARIMA Processes, Forecasting using ARIMA models.
Prescriptive Analytics: Mathematical optimization, Networks modeling-Multi-objective
optimization-Stochastic modeling, Decision and Risk analysis, Decision trees.
SCHOOL OF INFORMATION TECHNOLOGY, RGPV, BHOPAL
New Scheme Based on AICTE Flexible Curricula
[Link] Computer Science and Business System (CSBS)

Suggested List of Experiments:


1. Installing Weka and exploring a dataset.
2. Loading a dataset and visualizing the Data
3. Preprocessing a dataset from a real domain (Medical/Retail/Banking)
4. Building a classifier- Run Decision Tree, Naïve Bayesian Classifier, NN classifier and
SVM.
5. Mining Association Rules- Run Apriori Algorithm.
6. Building a statistical model using a sample dataset – preprocessing, hypothesis building,
model fitting, model validation and interpretation of results.
7. Implementation of linear regression technique for statistical model building.
8. Implementation of Non-linear regression technique for statistical model building.

Text Books:
1. Jiawei Han and Micheline Kamber, “Data Mining Concepts and Techniques”, Third
Edition, Elsevier.
2. Lior Rokach and Oded Maimon, “Data Mining and Knowledge Discovery Handbook”,
2nd Edition, Springer.
3. Ian H. Witten, Eibe Frank and Mark A. Hall “Data Mining: Practical Machine Learning
Tools and Techniques”, Fourth Edition, Elsevier.

Reference Books:
1. Draper, N. R. and Smith, H., “Applied Regression Analysis”, 3rd Edition, John Wiley.
2. Hosmer, D. W. and Lemeshow, S., “Applied Logistic Regression”, 3rd Edition, Wiley.
3. Daniel [Link], “Data Mining Methods and Models”, Wiley-Interscience.
4. Jason Brownlee “Machine Learning Mastery with Weka”.
5. [Link]

Course Outcomes:
On completion of the course, the students will be able to:
CO1: Understand the fundamentals of data mining and data representation.
CO2: Perform preprocessing tasks for the data set.
CO3: Apply association rules and predictive methods for data mining.
CO4: Build data models using linear and non-linear regression techniques.
CO5: Gain knowledge on time series analysis and prescriptive analysis.

You might also like