4 1 Syllabus Compiled V
4 1 Syllabus Compiled V
2020 – 21
IV B. Tech –I Semester
S.No Course Code Course Title Hoursperweek Credits
L T P C
Professional Elective-III
1.Cloud Computing
1 PE 2.Neural Networks and Soft Computing 3 0 0 3
3.Ad-hoc and Sensor Networks
4.Cyber Security & Forensics
Professional Elective-IV
1. Deep Learning Techniques
2 PE 2. Social Networks & Semantic Web 3 0 0 3
3. Computer Vision
4.MOOCS-NPTEL/SWAYAM%
Professional Elective-V
1.Block-Chain Technologies
3 PE 2.Wireless Network Security 3 0 0 3
3.Ethical Hacking
4.MOOCS-NPTEL/SWAYAM%
Open Elective-III
Open Elective
4 Open Electives offered by other departments/ 3 0 0 3
/Job Oriented
API and Microservices (Job Oriented Course)
Open Elective-IV
Open Elective Open Electives offered by other departments/
5 3 0 0 3
/Job Oriented Secure Coding Techniques (Job Oriented
Course)
Universal Human Values 2: Understanding
6 HS 3 0 0 3
Harmony
1.PYTHON: Deep Learning OR
2.MEAN Stack Technologies-Module II-
7 SO 0 0 4 2
Angular JS and MongoDB OR
3.APSSDC offered Courses
Industrial/Research Internship 2 months
8 PR (Mandatory) after third year (to be 0 0 0 3
evaluated during VII semester
Total credits 23
Software Engineering$ / any other from PART-
11 Minor 3 0 2 3+1
B (For Minor)
Any course from the Pool, as per the opted
12 Honors 4 0 0 4
track
Minor course through SWAYAM - - - 2
$- Integrated Course
% - MOOC Course
R-20 Syllabus for CSE, JNTUK w. e. f. 2020 – 21
L T P C
IV Year – I Semester
3 0 0 3
CYBER SECURITY & FORENSICS
(Professional Elective-III)
Course Objectives:
The aim of the course is to
identify security risks and take preventive steps
understand the forensics fundamentals
understand the evidence capturing process
understand the preservation of digital evidence
UNIT I: Introduction to Cybercrime: Introduction, Cybercrime: Definition and Origins of the Word,
Cybercrime and Information Security, Cybercriminals, Classifications of Cybercrime, Cyberstalking,
Cybercafe and Cybercrimes, Botnets. Attack Vector, Proliferation of Mobile and Wireless Devices,
Security Challenges Posed by Mobile Devices, Attacks on Mobile/Cell Phones, Network and Computer
Attacks.
UNIT II: Tools and Methods : Proxy Servers and Anonymizers, Phishing, Password Cracking,
Keyloggers and Spywares, Virus and Worms, Trojan Horses and Backdoors, Steganography, Sniffers,
Spoofing, Session Hijacking Buffer over flow, DoS and DDoS Attacks, SQL Injection, Buffer Overflow,
Attacks on Wireless Networks, Identity Theft (ID Theft), Foot Printing and Social Engineering, Port
Scanning, Enumeration.
UNIT III: Cyber Crime Investigation: Introduction, Investigation Tools, eDiscovery, Digital Evidence
Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail Recovery,
Hands on Case Studies. Encryption and Decryption Methods, Search and Seizure of Computers,
Recovering Deleted Evidences, Password Cracking.
UNIT IV: Computer Forensics and Investigations: Understanding Computer Forensics, Preparing for
Computer Investigations. Current Computer Forensics Tools: Evaluating Computer Forensics Tools,
Computer Forensics Software Tools, Computer Forensics Hardware Tools, Validating and Testing
Forensics Software, Face, Iris and Fingerprint Recognition, Audio Video Analysis, Windows System
Forensics, Linux System Forensics, Graphics and Network Forensics, E-mail Investigations, Cell Phone
and Mobile Device Forensics.
UNIT V: Cyber Crime Legal Perspectives: Introduction, Cybercrime and the Legal Landscape around
the World, The Indian IT Act, Challenges to Indian Law and Cybercrime Scenario in India, Consequences
of Not Addressing the Weakness in Information Technology Act, Digital Signatures and the Indian IT
Act, Amendments to the Indian IT Act, Cybercrime and Punishment, Cyberlaw, Technology and
Students: Indian Scenario.
R-20 Syllabus for CSE, JNTUK w. e. f. 2020 – 21
Text Books:
1. Sunit Belapure Nina Godbole “Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, WILEY, 2011.
2. Nelson Phillips and Enfinger Steuart, “Computer Forensics and Investigations”, Cengage
Learning, New Delhi, 2009.
Reference Books:
1. Michael T. Simpson, Kent Backman and James E. Corley, “Hands on Ethical Hacking and
Network Defence”, Cengage, 2019.
2. Computer Forensics, Computer Crime Investigation by John R. Vacca, Firewall Media, New
Delhi.
3. Alfred Basta, Nadine Basta,Mary Brown and Ravinder Kumar “Cyber Security and Cyber
Laws” , Cengage,2018.
E-Resources:
1. CERT-In Guidelines- http://www.cert-in.org.in/
2. https://www.coursera.org/learn/introduction-cybersecurity-cyber-attacks [ Online Course]
3. https://computersecurity.stanford.edu/free-online-videos [ Free Online Videos]
4. Nickolai Zeldovich. 6.858 Computer Systems Security. Fall 2014. Massachusetts Institute of
Technology: MIT OpenCourseWare, https://ocw.mit.edu License: Creative Commons BY-NC-
SA.
R-20 Syllabus for CSE, JNTUK w. e. f. 2020 – 21
L T P C
IV Year – I Semester
3 0 0 3
DEEP LEARNING TECHNIQUES
(Professional Elective-IV)
Course Outcomes: After the completion of the course, student will be able to
Demonstrate the fundamental concepts learning techniques of Artificial Intelligence, Machine
Learning and Deep Learning.
Discuss the Neural Network training, various random models.
Explain the Techniques of Keras, TensorFlow, Theano and CNTK
Classify the Concepts of CNN and RNN
Implement Interactive Applications of Deep Learning.
UNIT I:
Fundamentals of Deep Learning: Artificial Intelligence, History of Machine learning: Probabilistic
Modeling, Early Neural Networks, Kernel Methods, Decision Trees, Random forests and Gradient
Boosting Machines, Fundamentals of Machine Learning: Four Branches of Machine Learning,
Evaluating Machine learning Models, Overfitting and Underfitting. [Text Book 2]
UNIT II: Introducing Deep Learning: Biological and Machine Vision, Human and Machine Language,
Artificial Neural Networks, Training Deep Networks, Improving Deep Networks. [Text Book3]
UNIT III: Neural Networks: Anatomy of Neural Network, Introduction to Keras: Keras, TensorFlow,
Theano and CNTK, Setting up Deep Learning Workstation, Classifying Movie Reviews: Binary
Classification, Classifying newswires: Multiclass Classification. [Text Book 2]
UNIT IV:
Convolutional Neural Networks: Nerual Network and Representation Learing, Convolutional Layers,
Multichannel Convolution Operation, Recurrent Neural Networks: Introduction to RNN, RNN Code,
PyTorch Tensors: Deep Learning with PyTorch, CNN in PyTorch. [Text Book 3]
UNIT V:
Interactive Applications of Deep Learning: Machine Vision, Natural Language processing, Generative
Adversial Networks, Deep Reinforcement Learning. [Text Book 1]
Deep Learning Research: Autoencoders, Deep Generative Models: Boltzmann Machines Restricted
Boltzmann Machines, Deep Belief Networks. [Text Book 1]
Text Books:
1. Deep Learning- Ian Goodfellow, Yoshua Bengio and Aaron Courvile, MIT Press, 2016
2. Deep Learning with Python - Francois Chollet, Released December 2017, Publisher(s): Manning
Publications, ISBN: 9781617294433
3. Deep Learning Illustrated: A Visual, Interactive Guide to Artificial Intelligence - Jon Krohn, Grant
Beyleveld, Aglaé Bassens, Released September 2019, Publisher(s): Addison-Wesley Professional,
ISBN: 9780135116821
R-20 Syllabus for CSE, JNTUK w. e. f. 2020 – 21
Reference Books:
1. Artificial Neural Networks, Yegnanarayana, B., PHI Learning Pvt. Ltd, 2009.
2. Matrix Computations, Golub, G.,H., and Van Loan,C.,F, JHU Press,2013.
3. Neural Networks: A Classroom Approach, Satish Kumar, Tata McGraw-Hill Education, 2004.
Web Link:
1. Swayam NPTEL: Deep Learning : https://onlinecourses.nptel.ac.in/noc22_cs22/preview
R-20 Syllabus for CSE, JNTUK w. e. f. 2020 – 21
L T P C
IV Year – I Semester
3 0 0 3
WIRELESS NETWORK SECURITY
(Professional Elective-V)
Course Objectives:
The objective of this course is to understand the importance of Wireless networks security and its
application
Course Outcomes: After the completion of the course, student will be able to
Explain the Threats in networks and provide Authentication to real time problems.
Identify and investigate in-depth both early and contemporary threats to wireless networks
security
Ability to analyze and determine for any organization the database security requirements and
appropriate solutions
Determined IP Security Issues and solve real time problems.
Build wireless Development Strategies in real time issues
UNIT I: Introduction to Wireless: History of Wireless Technologies, History of Wireless Security, State
of the Wireless Security Industry, 2001 Wireless Threats: Uncontrolled Terrain, Communications
Jamming, DoS Jamming, Injections and Modifications of Data, Man-in-the-Middle (MITM) Attack,
Rogue Client, Rogue Network Access Points, Attacker Equipment,
UNIT II: Introduction to Wireless Security Protocols and Cryptography: Recovery the FUD, OSI
Model, OSI Simplified, Internet Model, Wireless LAN Security Protocols, Cryptography, SSL/TLS,
Secure Shell Protocols, Terminal Access and File Transfer, Port Forwarding a Word of Caution, Man-in-
the-Middle of SSL/TLS and SSH, WTLS, WEP,802.1x, IP Security
UNIT III:
Security Considerations to Wireless Devices: Wireless Device Security Issues, Physical Security,
Information Leakage, Device Security Features, Application Security, Detailed Device Analysis, Laptops,
Personal Digital Assistants (PDAS), Wireless Infrastructure Wireless Technologies and Applications:
Introduction to Cellular Networks- FDMA, TDMA, CDMA, Spread Spectrum Primer, Analogy, TDMA
Vs CDMA, PDC, Security Threats
UNIT IV:
Introduction to Wireless Data Networks: Cellular Digital Packet Data (CDPD), CDPD Architecture,
CDPD Security, Mobitex- Mobitex Architecture, Mobitex Security Architecture, Security Issues,
Gateway, Security Model Wireless Standards and Technologies: Current and Future Technologies-
Infrared, Radio, Spread Spectrum, OFDM, Current and Future Standards- IEEE 802 Standards, ETSI,
Home RF, Ultra-wide band Radio (UWB)
Text Books:
1. Wireless Security, Merritt Maxim and David Pollino, Osborne/McGraw Hill, New Delhi, 2005
2. Wireless Security Models: Threats and Solutions, Nichols and Lekka, Tata McGraw Hill, New
Delhi 2006
R-20 Syllabus for CSE, JNTUK w. e. f. 2020 – 21
Reference Books:
1. Behrouz A.Forouzan, ―Cryptography & Network Security‖, Tata McGraw Hill, India, New Delhi,
2009
2. William Stallings, ―Cryptography and Network Security, Prentice Hall, New Delhi, 2006
3. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons, New York, 2004
R-20 Syllabus for CSE, JNTUK w. e. f. 2020 – 21
L T P C
IV Year – I Semester
3 0 0 3
API AND MICROSERVICES
(Job Oriented Course)
Course Outcomes:
At the end of this course, the student will be able to
Develop a Spring Data JPA application with Spring Boot
Implement CRUD operations using Spring Data JPA
Implement pagination and sorting mechanism using Spring Data JPA
Implement query methods for querying the database using Spring Data JPA
Implement a custom repository to customize a querying mechanism using Spring Data JPA
Understand update operation using query approaches in Spring Data JPA
Implement Spring Transaction using Spring Data JPA
Develop RESTful endpoints using Spring REST Processing URI parameters
Write RESTful services using Spring REST that consumes and produces data in different formats
Handle exceptions and errors in Spring REST endpoints
Write Spring based REST clients to consume RESTful services programmatically
Create secure RESTful endpoints using Spring Security Document and version the Spring REST
endpoints Implement CORS in a Spring REST application
UNIT I:
Spring 5 Basics : Why Spring, What is Spring Framework, Spring Framework - Modules, Configuring
IoC container using Java-based configuration, Introduction To Dependency Injection, Constructor
Injection, Setter Injection, What is AutoScanning
UNIT II:
Spring Boot: Creating a Spring Boot Application, Spring Boot Application Annotation, What is
Autowiring , Scope of a bean, Logger, Introduction to Spring AOP, Implementing AOP advices, Best
Practices : Spring Boot Application
UNIT III:
Spring Data JPA with Boot: Limitations of JDBC API, Why Spring Data JPA, Spring Data JPA with
Spring Boot, Spring Data JPA Configuration, Pagination and Sorting, Query Approaches, Named Queries
and Query, Why Spring Transaction, Spring Declarative Transaction, Update Operation in Spring Data
JPA, Custom Repository Implementation, Best Practices - Spring Data JPA
UNIT IV:
Web Services: Why Web services, SOA - Service Oriented Architecture, What are Web Services, Types
of Web Services, SOAP based Web Services, RESTful Web Services, How to create RESTful Services
UNIT V:
Spring REST: Spring REST - An Introduction, Creating a Spring REST Controller, @RequestBody and
ResponseEntity, Parameter Injection, Usage of @PathVariable, @RequestParam and @MatrixVariable,
Exception Handling, Data Validation, Creating a REST Client, Versioning a Spring REST endpoint,
Enabling CORS in Spring REST, Securing Spring REST endpoints
Text Books:
1. Spring in action, 5th Edition, Author: Craig Walls, Ryan Breidenbach, Manning books
Web references:
L T P C
IV Year – I Semester
3 0 0 3
UNIVERSAL HUMAN VALUES 2: UNDERSTANDING HARMONY
1. Objective:
The objective of the course is four fold:
1. Development of a holistic perspective based on self-exploration about themselves (human
being),family, society and nature/existence.
2. Understanding (or developing clarity) of the harmony in the human being, family, society and
nature/existence
3. Strengthening of self-reflection.
4. Development of commitment and courage to act.
2. Course Topics:
The course has 28 lectures and 14 practice sessions in 5 modules:
Module 1: Course Introduction - Need, Basic Guidelines, Content and Process for Value Education
1. Purpose and motivation for the course, recapitulation from Universal Human Values-I
2. Self-Exploration–what is it? - Its content and process; ‘Natural Acceptance’ and Experiential
Validation- as the process for self-exploration
3. Continuous Happiness and Prosperity- A look at basic Human Aspirations
4. Right understanding, Relationship and Physical Facility- the basic requirements for fulfilment of
aspirations of every human being with their correct priority
5. Understanding Happiness and Prosperity correctly- A critical appraisal of the current scenario
6. Method to fulfil the above human aspirations: understanding and living in harmony at various levels.
Include practice sessions to discuss natural acceptance in human being as the innate acceptance for living
with responsibility (living in relationship, harmony and co-existence) rather than asarbitrariness in choice
based on liking-disliking
10. Understanding values in human-human relationship; meaning of Justice (nine universal values in
relationships) and program for its fulfilment to ensure mutual happiness; Trust and Respect as the
foundational values of relationship
11. Understanding the meaning of Trust; Difference between intention and competence
12. Understanding the meaning of Respect, Difference between respect and differentiation; the other
salient values in relationship
13. Understanding the harmony in the society (society being an extension of family): Resolution,
Prosperity, fearlessness (trust) and co-existence as comprehensive Human Goals
14. Visualizing a universal harmonious order in society- Undivided Society, Universal Order- from
family to world family.
Include practice sessions to reflect on relationships in family, hostel and institute as extended family, real
life examples, teacher-student relationship, goal of education etc. Gratitude as a universal value in
relationships. Discuss with scenarios. Elicit examples from students’ lives
Module 4: Understanding Harmony in the Nature and Existence - Whole existence as Coexistence
18. Understanding the harmony in the Nature
19. Interconnectedness and mutual fulfilment among the four orders of nature- recyclability and self-
regulation in nature
20. Understanding Existence as Co-existence of mutually interacting units in all-pervasive space
21. Holistic perception of harmony at all levels of existence.
Include practice sessions to discuss human being as cause of imbalance in nature (film “Home” can be
used), pollution, depletion of resources and role of technology etc.
3. READINGS:
In the discussions, particularly during practice sessions (tutorials), the mentor encourages the student to
connect with one’s own self and do self-observation, self-reflection and self-exploration. Scenarios may
be used to initiate discussion. The student is encouraged to take up” ordinary” situations rather than”
extra-ordinary” situations. Such observations and their analyses are shared and discussed with other
students and faculty mentor, in a group sitting.
Tutorials (experiments or practical) are important for the course. The difference is that the laboratory is
everyday life, and practical are how you behave and work in real life. Depending on the nature of topics,
worksheets, home assignment and/or activity are included. The practice sessions (tutorials)
would also provide support to a student in performing actions commensurate to his/her beliefs. It is
intended that this would lead to development of commitment, namely behaving and working basedon
basic humanvalues.
It is recommended that this content be placed before the student as it is, in the form of a basic foundation
course, without including anything else or excluding any part of this content. Additional content may be
offered in separate, higher courses.
This course is to be taught by faculty from every teaching department, including HSS faculty. Teacher
preparation with a minimum exposure to at least one 8-day FDP on Universal Human Values is deemed
essential.
5. ASSESSMENT:
This is a compulsory credit course. The assessment is to provide a fair state of development of thestudent,
so participation in classroom discussions, self-assessment, peer assessment etc. will be used in evaluation.
Example:
Assessment by faculty mentor: 10 marks
Self-assessment: 10 marks
Assessment by peers: 10 marks
Socially relevant project/Group Activities/Assignments: 20 marks
Semester End Examination: 50 marks
R-20 Syllabus for CSE, JNTUK w. e. f. 2020 – 21
L T P C
IV Year – I Semester
0 0 4 2
MEAN STACK TECHNOLOGIES-MODULE II- ANGULAR JS, MONGODB
(Skill Oriented Course)
Course Outcomes:
• Build a component-based application using Angular components and enhance their functionality using
directives.
• Utilize data binding for developing Angular forms and bind them with model data.
• Apply Angular built-in or custom pipes to format the rendered data.
• Develop a single page applic
• ation by using synchronous or asynchronous Angular routing.
• Make use of MongoDB queries to perform CRUD operations on document database.
List of Exercises:
Text Books:
1. Programming the World Wide Web, 7th Edition, Robet W Sebesta, Pearson.
2. Pro Mean Stack Development, 1st Edition, ELadElrom, Apress O’Reilly.
3. Full Stack JavaScript Development with MEAN, Colin J Ihrig, Adam Bretz, 1st edition, SitePoint,
SitePoint Pty. Ltd., O'Reilly Media.
4. MongoDB – The Definitive Guide, 2nd Edition, Kristina Chodorow, O’Reilly
Web Links:
1. https://infyspringboard.onwingspan.com/en/app/toc/lex_20858515543254600000_shared/overview
(Angular JS)
2. https://infyspringboard.onwingspan.com/en/app/toc/lex_auth_013177169294712832113_shared/ove
rview (MongoDB)
R-20 Syllabus for ME JNTUK w. e.f.2020–21
MENTOFMECHANICALENGINEERING
OFMECHANICALENGINEERING L T P C
IV Year - I Semester
3 0 0 3
OPERATIONS MANAGEMENT (OE-4)
Course Objectives:
1) To develop the skills of forecasting, production systems and Aggregate Planning.
2) To provide the knowledge of materials management and scheduling policies
3) To understand the principles of inventory control, MRP and contemporary management
techniques.
4) To guide in learning the key concepts and issues of quality management in both manufacturing
and service organizations.
5) To develop the knowledge and skill to find out the optimum solutions for a given situation using
optimization techniques.
UNIT – I:
Forecasting: Introduction, types of forecasting and their uses, General principles of forecasting,
forecasting techniques: qualitative and quantitative methods of Forecasting.
Production Systems: Types of production systems: job, batch, mass and flow type production.
Aggregate Planning: Introduction, aggregate planning strategies, aggregate planning methods,
problems
UNIT – II:
Scheduling: Introduction, difference with loading, scheduling policies, techniques, standard
scheduling methods.
Materials Management: Introduction, functions of materials management, inventory, inventory
management, types of inventories, Selective inventory control techniques: ABC analysis, VED
analysis.
UNIT – III:
Inventory Control: P and Q Systems, Basic Economic Order Quantity model, Price break model,
assumptions and problems
Material Requirement Planning: Introduction, Inputs, outputs and MRP logic.
Contemporary management techniques: Introduction to Lean, JIT, ERP and Supply chain
Management.
UNIT – IV:
Quality Management: Quality engineering, Taguchi Principles, SQC – X bar, p and c charts,
problems, Juran‘s principles Introduction to quality acceptance sampling.
Deming‘s Philosophy, Introduction to Total quality management, Quality Function Deployment,
Introduction to six sigma and ISO 9000 2015 standards.
R-20 Syllabus for ME JNTUK w. e.f.2020–21
MENTOFMECHANICALENGINEERING
UNIT – V: OFMECHANICALENGINEERING
Optimization: Linear Programming – Graphical and simplex method – problems, Demonstration of
Transportation and Assignment Models, Travelling Salesman problem.
TEXT BOOKS:
1. Modern Production/ operations managements / Baffa & Rakesh Sarin
2. Operations Management – an Integrated Approach, International student Version, R. Dan Reid
and Nada R. Sanders, John Wiley & Sons
3. Production and Operations management by K. C. Jain, Wiley
4. Operations Management by William J. Stevenson, McGraw-Hill Companies 2015
5. SOperations Management by Jay Heizer , Barry Render, Chuck Munson , Amit Sachan Twelfth
Edition, Pearson, 2017
REFERENCES:
1. Maynard‘s Industrial Engineering Handbook, Kjell B. Zandin, Fifth Edition 2001, The McGraw-
Hill Companies, Inc.
2. Operations Management S.N. Chary.
3. Inventory Control Theory and Practice / Martin K. Starr and David W. Miller.