Course Objective: 

1)    Identify the scope and necessity of Data Mining & Warehousing for the society.
2)    Describe the designing of Data Warehousing so that it can be able to solve the root  problems.
3)    To understand various tools of Data Mining and their techniques to solve the real time problems.
4)    To develop ability to design various algorithms based on data mining tools.
5)    To develop further interest in research and design of new Data Mining  techniques.


Course Outcome:

The candidate will get knowledge of: 
 - Data preprocessing and data quality. 
 - Modeling and design of data warehouses. 
 - Algorithms for data mining. 
 - Be able to design data warehouses. 
 - Ability to apply acquired knowledge for understanding data and select suitable methods for data analysis

Course Objective:-  To understand the architecture and working methodology of the e-commerce,and relevant issues of electronic business transactions.

Course Outcomes:

  1. Recognize  the concept & need  of business transactions to be carried over electronically.
  2. Determine & analyze the different business models, trade-cycles existing.
  3. Engage and analyze the concept of universal data standards required for data interchange.
  4. Explain & identify the norms, regulatory, legal environments ethical issues needed for carrying out business transactions electronically.
  5. Judge the aspects of security implementation in electronic transaction.

Course Objective: The students will be able to identify the security threats, monitor them and employ the knowledge of security services and mechanisms to counter them.
Course Outcome:
  1. Recalling basic network protocols and identifying potential security issues in a network.
  2. Explain the foundational concepts of cryptography and associate them with classical cryptography .
  3. Utilizing the building blocks from mathematics to construct ciphers and algorithms, both symmetric and asymmetric, to achieve the basic goals of cryptography.
  4. Integrating cryptographic ciphers and algorithms to structure security protocols.
  5. Justify the operations of the cryptographic algorithms and protocols and verify them in practice, through experimentation with open-source libraries and tools.

Course Objective: To introduce the concepts and principles of compiler design and understand the various phases of designing a compiler.

Course Outcomes: After completion of this course the students are expected to be able to demonstrate following knowledge, skills and attitudes:-

  1. Identify the major concept areas of language translation and compiler design and the different phases of compilation.
  2. Understand the functionality of lexical analysis and design of Lex tool used to develop scanner.
  3. Understand parsing and apply the knowledge of parsing in various parsers.
  4. Explain specification of type system and storage organization in run-time environment of a program.
  5. Discuss and apply the techniques of code optimization, machine code generation and symbol table.

Course Objective: To understand the different concepts of software engineering through the different stages of its lifecycle model.

Course Outcomes: After completion of this course the students are expected to be able to demonstrate following knowledge, skills and attitudes

  1. Recognize the different sequential stages of a software development process model.
  2. Summarize the various software design principles.
  3. Use standard tools to monitor the resource and progress of a software project.
  4. Identify the different software testing procedures using different test –case suites for its validation.
  5. Classify the different process or model of checking the quality aspect s of a software.

Course Description: This course will give you an insight into architecture, protocols, standards, languages, tools and techniques of web technology. It gives an overview of how you could analyze requirements, plan, design, implement and test a range of web applications.

Course Objective: The students should have the insights of the Internet programming and how to design complete applications over the web.

Course Outcomes:

  1. Describe the protocols used for the Internet, and recollecting basic components and functionalities of HTML, CSS, XML, Javascript, Java Applet and Perl in the workings of web applications.
  2. Summarize and classifying basic structures of HTML, CSS, XML, Javascript, Java Applet and Perl in association with practical client-server model of web design.
  3. Construct web applications utilizing HTML, CSS, XML, Javascript, Java Applet and Perl.
  4. Deconstruct a website to identify the structures based on HTML, CSS, and Javascript.
  5. Monitor security vulnerabilities of a website, and testing for a secure client-server model.
  6. Design, plan and produce secure, effective and customized web applications.

Course Objective: Describe the specifications and functionalities of various protocols / standards of Mobile networks.

Course Outcome: After completion of this course the students are expected to be able to

  1. Describe the basic concepts and principles in mobile computing
  2. Understand the architecture and working of Wireless LAN, PAN and Mobile Networks.
  3. Illustrate the architecture and protocols in Mobile Computing and to identify the trends and latest development of the technologies in the area.
  4. Analyze and compare current mobile computing technologies including various platforms and their usability.
  5. Evaluate the architecture and principles of operation of Mobile Computing system