Beruflich Dokumente
Kultur Dokumente
&SYLLABI
BE CSE
Batch 2016 – 2020 & 2017-2020 LEET
(With Specializations)
SCHEME (2016-2020) B.E. CSE
7th semester/4th year
Industrial Summer
8 CSI-436
Training*
0 0 0 60 40 100 2
Total 9 2 5 17
For 7th Semester
CSB-471 Bioinformatics
Marks-100
Internal-60 External-40
Course Objectives
Get the knowledge of network security tools, applications, concepts of public key
I encryption, number theory, authentication and Hash functions.
UNIT-I [15h]
Security trends – Attacks and services – Classical crypto systems – Different types of ciphers –
LFSR sequences – Basic Number theory – Congruences – Chinese Remainder theorem –
Modular exponentiation – Fermat and Euler's theorem – Legendre and Jacobi symbols – Finite
fields – continued fractions.
Simple DES – Differential cryptoanalysis – DES – Modes of operation – Triple DES – AES –
RC4 – RSA – Attacks – Primality test – factoring.
UNIT-II [15h]
UNIT-III [16h]
Text Books:
1. Wade Trappe, Lawrence C Washington, “ Introduction to Cryptography with coding
theory”, 2nd ed, Pearson, 2007.
2. William Stallings, “Crpyptography and Network security Principles and Practices”,
Pearson/PHI, 4th ed, 2006.
Reference Material:
1. W. Mao, “Modern Cryptography – Theory and Practice”, Pearson Education
Please go through these instructions thoroughly and follow the same pattern while setting the paper as the
students have been prepared according to this format.
The syllabus has been divided into three equal units. The paper setter is required to set ten questions in
all, three questions from each unit and a compulsory question consisting of five sub parts and based on
the whole syllabus. The candidate will be required to attempt six questions including the compulsory
question number no 1 and not more than two questions from each unit.
Course Code-CSO-445 Cryptography & Network Security
Department Teaching
Department of Computer Science & Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
I,II,
outcome with Program
III
outcome
BS ES PD PC PE OE Project/Training
Category
Approval Date of meeting of the Board of Studies
Chandigarh University, Gharuan
Network Operating System L T P C
Marks-100
Internal-60 External-40
Course Objectives
This course is intended for students to experience on the technologies included in Network
Operating System.
Gain in-depth knowledge of Windows Server 2008.
Unit Course Outcome
UNIT-I [15h]
Data Communications Concepts: Digital and Analog signals, Parallel and Serial signals
Synchronous and Asynchronous, Simplex/Half/Pull Duplex and Multiplexing.
Introduction of Computer Networks: Description of LAN, WAN, MAN, PAN and Wireless
networks.
Basic terminology of Computer Networks: - Physical and Logical networks, Bridge, Switch,
Hub, Gateway, Routers, Repeaters, Modem, Network Interface Card, Physical Address/MAC
Address and Logical Address and IP Addressing and Subnet Mask.
Communication Channels: Telephone lines, Coaxial Cables, and Optical Fiber Transmission
Network Topologies: Bus Topology, Ring Topology, Star Topology, Hybrid Topology and
Mesh Topology
UNIT-II [15h]
UNIT-III [15h]
Installing windows server 2008: Plan for a server roles and installing windows server
core,configure server core,Add and configure server roles,add backup feature and migrate roles
from previous versions of windows server.
Text Books:
Please go through these instructions thoroughly and follow the same pattern while setting the paper as the
students have been prepared according to this format.
The syllabus has been divided into three equal units. The paper setter is required to set ten questions in
all, three questions from each unit and a compulsory question consisting of five sub parts and based on
the whole syllabus. The candidate will be required to attempt six questions including the compulsory
question number no 1 and not more than two questions from each unit.
Department Teaching
Department of Computer Science & Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
I,II,
outcome with Program
III
outcome
BS ES PD PC PE OE Project/Training
Category
Approval Date of meeting of the Board of Studies
Chandigarh University, Gharuan
Ethical Hacking L T P C
Marks-100
Internal-60 External-40
Course Objectives
Get the knowledge of network security tools, applications, concepts of public key
I encryption, number theory, authentication and Hash functions.
UNIT-I [14h]
FOOT PRINTING AND SOCIAL ENGINEERING : Web Tools for Foot Printing,
Conducting Competitive Intelligence, Google Hacking, Scanning, Enumeration, Trojans &
Backdoors, Virus & Worms, Proxy & Packet Filtering, Denial of Service, Sniffer, Social
Engineering – shoulder surfing, Dumpster Diving, Piggybacking.
UNIT-II [15h]
UNIT-III [16h]
Text Book:
1. Michael T. Simpson, Kent Backman, James E. “Corley, Hands‐On Ethical Hacking and
Network Defense”, Second Edition, CENGAGE Learning, 2010.
References Books:
1. Steven DeFino, Barry Kaufman, Nick Valenteen, “Official Certified Ethical Hacker Review
Guide”, CENGAGE Learning, 2009-11-01.
2. Patrick Engebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and
Penetration Testing Made Easy”, Syngress Basics Series Elsevier, August 4, 2011.
3. Whitaker & Newman, “ Penetration Testing and Network Defense” , Cisco Press,
Indianapolis, IN, 2006
Please go through these instructions thoroughly and follow the same pattern while setting the paper as the
students have been prepared according to this format.
The syllabus has been divided into three equal units. The paper setter is required to set ten questions in
all, three questions from each unit and a compulsory question consisting of five sub parts and based on
the whole syllabus. The candidate will be required to attempt six questions including the compulsory
question number no 1 and not more than two questions from each unit.
Department Teaching
Department of Computer Science & Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
I,II,
outcome with Program
III
outcome
BS ES PD PC PE OE Project/Training
Category
Approval Date of meeting of the Board of Studies
Chandigarh University, Gharuan
Natural Language Processing L T P C
Marks-100
Internal-60 External-40
Course Objectives
To provide the student with knowledge of various levels of analysis involved in NLP
To understand language modeling
To gain knowledge in automated natural language generation and machine translation
UNIT-I [15h]
UNIT-II [14h]
UNIT-III [16h]
Text Book:
Reference Books:
1. Daniel Jurafsky and James H Martin, ”Speech and Language Processing: An introduction to
Natural Language Processing, Computational Linguistics and Speech Recognition”, Prentice
Hall, 2nd Edition, 2008.
Please go through these instructions thoroughly and follow the same pattern while setting the paper as the
students have been prepared according to this format.
The syllabus has been divided into three equal units. The paper setter is required to set ten questions in
all, three questions from each unit and a compulsory question consisting of five sub parts and based on
the whole syllabus. The candidate will be required to attempt six questions including the compulsory
question number no 1 and not more than two questions from each unit.
Department Teaching
Department of Computer Science & Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
I,II,
outcome with Program
III
outcome
BS ES PD PC PE OE Project/Training
Category
Approval Date of meeting of the Board of Studies
Chandigarh University, Gharuan
Machine Learning L T P C
Prerequisite:
Familiarity with the basic probability theory
Familiarity with the basic linear algebra
Marks-100
Internal-40 External-60
Course Objectives
UNIT-I [14h]
Machine Learning: Introduction and Concepts, Types of Machine learning, Introduction to Data
Analysis: The need for Data Analysis, Reign of Data Analysis, What we are going to achieve and Real
life examples , Exploratory Data Analysis.
Boolean Functions: Representation of Boolean algebra, Classes of Boolean Functions, DNF Functions,
CNF Functions, Decision Lists, Symmetric and Voting Functions, Linearly Separable Functions
Descriptive Statistics: Introduction to the Descriptive Statistics and inferential Statistics.
Supervised Learning with Regression and Classification techniques -1
UNIT-II [15h]
Supervised Learning with Regression and Classification techniques -2: Ensemble Methods: Random
Forest, Neural Network, Deep learning
Decision Trees - Definitions - Representing concepts as decision trees. Recursive induction of decision
trees Supervised Learning of Univariate Decision Trees – Networks Equivalent to Decision Trees – Over
fitting and Evaluation - The Problem of Replicated Sub-trees..Picking the best splitting attribute: entropy
and information gain. Searching for simple trees and computational complexity. Occam’s razor. Over
fitting, noisy data, and pruning.
UNIT-III [16h]
Statistical Learning: Using Statistical Decision Theory, Background and General Method, Gaussian (or
Normal) Distributions, Conditionally Independent Binary Components.
Unsupervised Learning: Clustering Methods: K-means, Mean Shift Clustering, Density-Based Spatial
Clustering of Applications with Noise (DBSCAN), and Agglomerative Hierarchical Clustering.
Reference Material:
The syllabus has been divided into three equal units. The paper setter is required to set ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit.
Course Code-CSA-
Machine Learning
401
Department
Department of Computer Science & Engineering
Teaching the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
I,II,
outcome with Program
III
outcome
BS ES PD PC PE OE Project/Training
Category
Approval Date of meeting of the Board of Studies
Chandigarh University, Gharuan
Machine Learning Lab L T P C
Prerequisite:
Knowledge of basic computer science principles and skills, at a level
sufficient to write a reasonably non-trivial computer program.
Marks-100
Internal-60 External-40
Course Objectives
II To develop skills of using recent machine learning software for solving practical
problems.
III To gain experience of doing independent study and research.
List of Experiments
UNIT-I
UNIT-II
UNIT-III
7. Implement K-means clustering algorithm (cluster some sample data set into disjoint
clusters using K-means).
8. Implement Principle Component Analysis on any data set.
Department Teaching
Department of Computer Science and Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category
Marks-100
Internal-40 External-60
Course Objectives
Get the knowledge of Soft Computing as Networks, Fuzzy Logic and Genetic
I
Algorithms and its Hybrid Applications
UNIT-I [15h]
Fuzzy Set Theory: Introduction to Classical Sets and Fuzzy sets – Classical Relations and Fuzzy
Relations – Tolerance and Equivalence Relations – Non interactive Fuzzy sets – Membership
Functions: Fuzzification – Methods of Membership Value Assignments – Defuzzification –
Lambda-Cutsfor Fuzzy sets and Fuzzy Relations – Defuzzification Methods.
Fuzzy Arithmetic and Fuzzy Measures: Fuzzy Rule Base and Approximate Reasoning: Truth
values and Tables in Fuzzy logic – Fuzzy Propositions – Formation of Rules – Decomposition
and Aggregation of rules – Fuzzy Reasoning – Fuzzy Inference Systems (FIS) – Fuzzy Decision
Making – Fuzzy Logic Control Systems.
UNIT-II [16h]
Text Books:
1. S.N. Shivanandam, Principle of soft computing, Wiley. ISBN13: 9788126527410 (2011)
2. Jyh-Shing Roger Jang, Chuen-Tsai Sun, EijiMizutani, “Neuro-Fuzzy and Soft Computing”,
PrenticeHall of India, 2003.
3. George J. Klir and Bo Yuan, “Fuzzy Sets and Fuzzy Logic-Theory and Applications”, Prentice
Hall, 1995.
Reference Material
1. James A. Freeman and David M. Skapura, “Neural Networks Algorithms, Applications, and
Programming Techniques”, Pearson Edn., 2003.
2. Mitchell Melanie, “An Introduction to Genetic Algorithm”, Prentice Hall, 1998.
3. David E. Goldberg, Genetic Algorithms in Search, Optimization & Machine Learning, Addison
Wesley, 1997.
Please go through these instructions thoroughly and follow the same pattern while setting the paper as the
students have been prepared according to this format.
Department Teaching
Department of Computer Science and Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category
Prerequisite:
Knowledge of basic computer science principles and skills, at a level
sufficient to write a reasonably non-trivial computer program.
Marks-100
Internal-60 External-40
Course Objectives
List of Experiments
1)
a) Write a Matlab program (m.file) to calculate union, intersection, complement and difference
of two fuzzy sets.
R=11000
11001
00100
00010
01001
by writing an M-file.
0 0.9 0 0.5 1
by a Matlab program.
R = 0.7 0.5
0.8 0.4
5)
(a) Use Matlab command line commands to display the Gaussian membership function. Given x
= 0–10 with increment of 0.1 and Gaussian function is defined between 0.5 and −5.
(b) Use Matlab command line commands to display the triangular membership function. Given
x = 0–10 with increment of 0.2 triangular membership function is defined between [3 4 5]
6) Illustrate different types of generalized bell membership functions using Matlab program
(7) Using Matlab program find the crisp lambda cut set relations for λ = 0.2, the fuzzy matrix is
given by R= 0.2 0.7 0.8 1
1 0.9 0.5 0.1
0 0.8 1 0.6
0 0.4 1 0.3
Department Teaching
Department of Computer Science and Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category
Prerequisite:
Familiarity with the basic artificial modules.
Familiarity with the basic neural network.
Marks-100
Internal-40 External-60
Course Objectives
UNIT-I [14h]
Backpropagation networks : (BPN) :Architecture of feed forward network, single layer ANN,
multilayer perceptron, back propagation learning, input - hidden and output layer computation,
backpropagation algorithm, applications, selection of tuning parameters in BPN, Numbers of
hidden nodes, learning.
UNIT-II [15h]
Basic functional units of ANN for pattern recognition tasks: Basic feedforward, Basic feed
back and basic competitive learning neural network. Pattern association, pattern classification
and pattern mapping tasks.
b) Feed back neural networks Pattern storage networks, stochastic networks and simulated
annealing, Boltzmann machine and Boltzmann learning
UNIT-III [16h]
NET Talk: to convert English text to speech. Recognition of consonant vowel (CV) segments,
texture classification and segmentation
Text Books:
Please go through these instructions thoroughly and follow the same pattern while setting the
paper as the students have been prepared according to this format.
The syllabus has been divided into three equal units. The paper setter is required to set ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit.
Course Code-
Artificial Neural Network
CSA-403
Department
Department of Computer Science & Engineering
Teaching the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
I,II,
outcome with Program
III
outcome
BS ES PD PC PE OE Project/Training
Category
Approval Date of meeting of the Board of Studies
Chandigarh University, Gharuan
Artificial Neural Network Lab L T P C
Prerequisite:
Knowledge of basic computer science principles and skills, at a level
sufficient to write a reasonably non-trivial computer program.
Marks-100
Internal-60 External-40
Course Objectives
List of Experiments
UNIT-I
Write a MATLAB program to plot a few activation functions that are being
1.
used in neural networks.
Generate ANDNOT function using McCulloch-Pitts neural net by a
2.
MATLAB program.
Write a MATLAB program for perceptron net for an AND function with
4.
bipolar inputs and targets.
UNIT-II
UNIT-III
Department Teaching
Department of Computer Science and Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category
Prerequisite:
Familiarity with the basic fuzzy logic.
Familiarity with the basic crisp logic.
Marks-100
Internal-40 External-60
Course Objectives
UNIT-I [14h]
Introduction, Classical Sets and Fuzzy Sets: Background, Uncertainty and Imprecision,
Statistics and Random Processes, Uncertainty in Information, Fuzzy Sets and Membership,
Chance versus Ambiguity. Classical Sets - Operations on Classical Sets, Properties of Classical
(Crisp) Sets, Mapping of Classical Sets to Functions Fuzzy Sets - Fuzzy Set operations,
Properties of Fuzzy Sets. Sets as Points in Hypercubes
Classical Relations and Fuzzy Relations: Cartesian Product, Crisp Relations- Cardinality of
Crisp Relations, Operations on Crisp Relations, Properties of Crisp Relations, Composition.
Fuzzy Relations - Cardinality of Fuzzy Relations, Operations on Fuzzy Relations, Properties of
Fuzzy Relations, Fuzzy Cartesian Product and Composition, Non-interactive Fuzzy Sets.
Tolerance and Equivalence Relations - Crisp Equivalence Relation, Crisp Tolerance Relation,
Fuzzy Tolerance and Equivalence Relations. Value Assignments - Cosine Amplitude, Max-min
Method, Other Similarity methods.
Classical Logic and Fuzzy Logic: Classical Predicate Logic – Tautologies, Contradictions,
Equivalence, Exclusive OR and Exclusive NOR, Logical Proofs, Deductive Inferences. Fuzzy
Logic, Approximate Reasoning, Fuzzy Tautologies, Contradictions, Equivalence and Logical
Proofs, Other forms of the Implication Operation, Other forms of the Composition Operation
Fuzzy Rule- Based Systems: Natural Language, Linguistic Hedges, Rule-Based Systems -
Canonical Rule Forms, Decomposition of Compound Rules, Likelihood and Truth Qualification,
Aggregation of Fuzzy Rules, Graphical Techniques of Inference
UNIT-III [16h]
Fuzzy Decision Making: Fuzzy Synthetic Evaluation, Fuzzy Ordering, Preference and
consensus, Multiobjective Decision Making, Fuzzy Bayesian Decision Method, Decision
Making under Fuzzy States and Fuzzy Actions.
Text Books:
1. Essentials of Fuzzy Modeling and Control- R. R. Yaser and D. P. Filer -John Wiley,
1994.
2. Fuzzy Logic With Engineering Applications- Timoty Ross,- McGraw Hill.
3. Fuzzy Logic Intelligence Control And Information- Yen- Pearson education.
Please go through these instructions thoroughly and follow the same pattern while setting the
paper as the students have been prepared according to this format.
The syllabus has been divided into three equal units. The paper setter is required to set ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit.
Course Code-
Fuzzy Logic
CSA-404
Department
Department of Computer Science & Engineering
Teaching the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
I,II,
outcome with Program
III
outcome
BS ES PD PC PE OE Project/Training
Category
Approval Date of meeting of the Board of Studies
Chandigarh University, Gharuan
Fuzzy Logic Lab L T P C
Prerequisite:
Knowledge of basic computer science principles and skills, at a level
sufficient to write a reasonably non-trivial computer program.
Marks-100
Internal-60 External-40
Course Objectives
5) Provide an insight into fuzzy inference applications in the area of control and robotics.
List of Experiments
Program Outcome a b c d E f g h i j k
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category
Internal-40 External-60
Course Objectives
Understand image formation and the role human visual system plays in perception of
I
gray and color image data
III Get knowledge about signal processing algorithms and techniques in image
enhancement and image restoration
UNIT-I [17h]
Introduction: - Basic concept and origin, Examples of fields that use Digital Image Processing,
Fundamental steps in Digital Image Processing, Components of Image Processing System.
Digital Image Fundamentals:- Image Sensing and acquisition, digital image representation,
Image Sampling and Quantization, Some basic relationships between pixels.
Image Enhancement: - Introduction, Enhancement in spatial domain: Some basic gray level
transformations, Histogram processing, Basics of spatial filtering, Smoothing and sharpening
spatial filters. Enhancement in frequency domain: Fourier transform and filtering in frequency
domain, smoothing and sharpening frequency domain filters.
UNIT-II [14h]
Image Compression:- Redundancy and types of redundancy, Image compression models, Error
free compression, Lossy compression.
UNIT-III [13h]
Morphological Image Processing: - Introduction, Dilation and erosion, Opening and closing,
Some basic morphological algorithms.
Text Books:
Reference Material:
1. Sonka, Hlavac and Boyle, “Image-processing, Analysis and Machine Vision”, Cengage
Learning.
2. Low,“Introductory Computer Vision and Image Processing”,Tata McGraw Hill.
Please go through these instructions thoroughly and follow the same pattern while setting the paper as the
students have been prepared according to this format.
Department Teaching
Department of Computer Science & Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
I,II,
outcome with Program
III
outcome
BS ES PD PC PE OE Project/Training
Category
Approval Date of meeting of the Board of Studies
Chandigarh University, Gharuan
Digital Image Processing Lab L T P C
Prerequisite:
The labwork does entail programming in Matlab
Marks-100
Internal-40 External-60
Course Objectives
Acquire an appreciation for the image processing issues and techniques and be able to
I apply these techniques to real world problems. Be able to conduct independent study
and analysis of image processing problems and techniques
Learn the signal processing algorithms and techniques in image enhancement and image
III
restoration
List of Experiments
UNIT-I
UNIT-II
11. Write and execute program for image morphological operations erosion and dilation.
12. To write and execute program for wavelet transform on given image and perform inverse
Department Teaching
Department of Computer Science and Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category
Prerequisite:
Basic understanding of differential and integral calculus, linear algebra
and probability theory
Marks-100
Internal-40 External-60
Course Objectives
UNIT-I [14h]
Introduction: Pattern and features – Training and learning in pattern recognition systems –
Pattern recognition approaches – Statistical pattern recognition – Syntactic pattern recognition –
Neural pattern recognition – Reasoning driven pattern recognition – Discriminant functions –
Linear and Fisher’s discriminant functions.
Statistical Pattern Recognition: Gaussian model – Supervised learning – Parametric estimation
– Maximum likelihood estimation – Bayesian parameter estimation – Perceptron algorithm –
LMSE algorithm – Problems with Bayes approach – Pattern classification by distance functions
– Maximum distance pattern classifier.
UNIT-II [15h]
UNIT-III [8h]
Text Books:
1. Robert J, Schalkoff, “Pattern Recognition: Statistical, Structural and Neural Approaches”, John
Wiley & Sons Inc., New York.
Reference Material:
1. Duda R.O. and Hart P.E., “Pattern Classification and Scene Analysis”, John Wiley, New York.
2. Morton Nadler and Eric Smith P., “Pattern Recognition Engineering”, John Wiley and Sons,
New York.
3. Touand , Gonzalez R. “Patten Recognition Principles”Addision Wesley.
4. Earl Gose, Richard Johnsonbaugh, Steve Jost, “Pattern Recognition and Image Analysis”,
Prentice Hall of India Private Ltd., New Delhi
5. Duda R.O, Hart .P.E., D.G. Stal, “Pattern Classification”,John Wiley
6. SergiousTheodoridis, KonstantinosKoutroumbus, “Pattern Recognition”, Elsevier
Please go through these instructions thoroughly and follow the same pattern while setting the paper as the
students have been prepared according to this format.
Department Teaching
Department of Computer Science & Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
I,II,
outcome with Program
III
outcome
BS ES PD PC PE OE Project/Training
Category
Approval Date of meeting of the Board of Studies
Chandigarh University, Gharuan
Pattern Recognition Lab L T P C
Prerequisite:
Knowledge of Programming concepts or Matlab
Marks-100
Internal-40 External-60
Course Objectives
I
Design and implement certain important pattern recognition techniques.
II Design systems and algorithms for pattern recognition (signal classification), with focus
on sequences of patterns.
III Analyze classification problems probabilistically and estimate classifier performance.
List of Experiments
UNIT-I
1. Feature Representation
2. Mean and Covariance
3. Edge detection
UNIT-II
Program Outcome a b c d E f g h i j k
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category
Prerequisite:
Basic knowledge of Information hiding concepts
Marks-100
Internal-40 External-60
Course Objectives
UNIT-I [14h]
A Survey of Steganographic Techniques: Substitution systems and Bit Plane Tools, Transform
Domain Techniques: - Spread Spectrum and Information hiding, Statistical Steganography,
Distortion Techniques, Cover Generation Techniques.
UNIT-II [15h]
UNIT-III [16h]
Text Books:
Reference Material:
Please go through these instructions thoroughly and follow the same pattern while setting the paper as the
students have been prepared according to this format.
The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit.
Course Code-CSB-414 Steganography
Department Teaching
Department of Computer Science & Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
I,II,
outcome with Program
III
outcome
BS ES PD PC PE OE Project/Training
Category
Approval Date of meeting of the Board of Studies
Chandigarh University, Gharuan
Steganography Lab L T P C
Prerequisite:
Marks-100
Internal-40 External-60
Course Objectives
III
Various kinds of transforms
List of Experiments
UNIT-I
Department Teaching
Department of Computer Science and Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category
Marks-100
Internal-40 External-60
Course Objectives
UNIT-I [16h]
Essential terminology, Hardware, Software, Malware, Defining security, Need for security,
Cyber crime vs Computer based crime, Information Security statistics, Three pillars of Security,
Security myths, Identity of a Web Site, http vs https, Operating System fingerprinting, Hardening
operating system, updates, patches, CAN and CVEs, Host based firewall vs Network based
firewall, deploying firewall, sniffing network traffic.
UNIT-II [12h]
Recognizing Security Threats and attacks, Phishing and its countermeasures, Virus, Trojan
Horse, Worms, Spyware, Adware, Key logger, Social engineering, Denial of Service,
Spamming, Port Scanning, Password cracking, Security measures.
UNIT-III [17h]
Creating isolated network presence using virtualization, hosting different operating systems
virtually and networking amongst these, Identify website’s identity, Finding and understanding
CVEs, deploying firewall, Understanding phishing, using NMAP, netcat, using tcp
dump and wire shark, generating digital certificates, understanding CAs.
Text Books:
1. Atul Kahate, “Cryptography and Network Security” , Second Edition, McGrawHill, 2010.
Reference Material:
Please go through these instructions thoroughly and follow the same pattern while setting the paper as the
students have been prepared according to this format.
The syllabus has been divided into three equal units. The paper setter is required to set ten questions in
all, three questions from each unit and a compulsory question consisting of five sub parts and based on
the whole syllabus. The candidate will be required to attempt six questions including the compulsory
question number no 1 and not more than two questions from each unit.
Department Teaching
Department of Computer Science & Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
I,II,
outcome with Program
III
outcome
BS ES PD PC PE OE Project/Training
Category
Approval Date of meeting of the Board of Studies
Chandigarh University, Gharuan
Introduction to Information Security Lab L T P C
Marks-100
Internal-40 External-60
Course Objectives
List of Experiments
UNIT I
UNIT-II
Department Teaching
Department of Computer Science and Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category
Marks-100
Internal-40 External-60
Course Objectives
UNIT-I [14h]
UNIT-II [15h]
Information Theory - Complexity Theory - Number Theory - Factoring - Prime Number
Generation - Discrete Logarithms in a Finite Field - Data Encryption Standard (DES) – Lucifer -
Madryga - NewDES - GOST – 3 Way – Crab – RC5 - Double Encryption - Triple Encryption -
CDMF Key Shortening - Whitening.
UNIT-III [16h]
Secure Hash Algorithm (SHA) - One- Way Hash Functions Using Symmetric Block
Algorithms - Using Public-Key Algorithms - Message Authentication Codes.
Text Books:
1. Bruce Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C” John Wiley &
Sons.
Reference Material:
2. William Stallings, “Cryptography and Network Security”, 3rd Edition, Pearson Education,
Please go through these instructions thoroughly and follow the same pattern while setting the paper as the
students have been prepared according to this format.
Department Teaching
Department of Computer Science & Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
I,II,
outcome with Program
III
outcome
BS ES PD PC PE OE Project/Training
Category
Approval Date of meeting of the Board of Studies
Chandigarh University, Gharuan
Applied Cryptography Lab L T P C
Marks-100
Internal-40 External-60
Course Objectives
Understand the security of communication systems, networks and protocols based on a multitude of
I security metrics.
II Understand the use of cryptography to build security and privacy properties into real world
applications
III Implementaion of various cryptographic techniques
List of Experiments
UNIT-I
UNIT-II
5. Authenticating the given signature using MD5 hash algorithm.
6. Implementation of Diffie-Hellman algorithm
7. Implementation EIGAMAL cryptosystem.
8. Implementation of Goldwasser-Micali probabilistic public key system
9. Implementation of Rabin Cryptosystem.
10. Implementation of Kerberos cryptosystem
11. Firewall implementation and testing.
UNIT-III
12. Implementation of a trusted secure web transaction.
13. Cryptographic Libraries-Sun JCE/Open SSL/Bouncy Castle JCE.
14. Digital Certificates and Hybrid (ASSY/SY) encryption, PKI.
15. Message Authentication Codes.
16. Elliptic Curve cryptosystems (Optional)
17. PKCS Standards (PKCS1, 5, 11, 12), Cipher modes.
Department Teaching
Department of Computer Science and Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category
Marks-100
Internal-40 External-60
Course Objectives
II ActiveX Documents
UNIT-I [16h]
UNIT-II [19h]
URL Monikers: Hyper linking- Hyperlink Interface- Working with URL Monikers- Overview
of ISAPI- ISAPI Extension- ISAPI Filter.
Designing IIS Applications: Building IIS Applications- Building Data Driven DHTML
Applications.
UNIT-III [10h]
Text Books:
1. John Paul Muller,” Visual C++ 5 from the GroundUp”, Tata McGraw Hill Edition.
2. Noel Jerke,” Visual Basic 6 (The Complete Reference)”, Tata McGraw Hill Edition.
Please go through these instructions thoroughly and follow the same pattern while setting the paper as the
students have been prepared according to this format.
The syllabus has been divided into three equal units. The paper setter is required to set ten questions in
all, three questions from each unit and a compulsory question consisting of five sub parts and based on
the whole syllabus. The candidate will be required to attempt six questions including the compulsory
question number no 1 and not more than two questions from each unit.
Department Teaching
Department of Computer Science & Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
I,II,
outcome with Program
III
outcome
BS ES PD PC PE OE Project/Training
Category
Approval Date of meeting of the Board of Studies
Chandigarh University, Gharuan
Network Programming Lab L T P C
Marks-100
Internal-40 External-60
Course Objectives
To impart a solid foundation of the state of the art trends in computer networking
To provide a hands on experience of the same.
To give an overarching insight to all arenas of networking.
The simulation experiments are included to have familiarization of the architecture and internal
working of the tool and to equip the students with a free to use mindset afterwards.
Unit Course Outcome
List of Experiments
UNIT-I
Department Teaching
Department of Computer Science and Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category
Marks-100
Internal-40 External-60
Course Objectives
To identify and explain the concepts, policies, and technologies associated with a layered
and diversified defense-in-depth strategy.
To discuss the objectives of access control methods and describe how the available
methods are implemented in the defense of a network.
Unit Course Outcome
UNIT-I [16h]
OSI: ISO Layer Protocols:-Application Layer Protocols-TCP/IP, HTTP, SHTTP, LDAP, MIME,
POP & POP3-RMON-SNTP-SNMP. Presentation
Layer Protocols: Light Weight Presentation Protocol Session layer protocols –RPC protocols-
transport layer protocols- TOT, RDP, RUDP, TALI, TCP/UDP, compressed TCP.
Network layer
Protocols: routing protocols-border gateway protocol-exterior gateway protocol-internet
protocol IPv4- IPv6- Internet Message Control Protocol- IRDP- Transport Layer Security-TSL-
SSL-DTLS.
UNIT-II [15h]
Data Link layer Protocol: ARP – IPCP – IPv6CP – RARP – SLIP .Wide Area Network
Protocols- ATM protocols – Broadband Protocols – Point to Point Protocols – Other WAN
Protocols- security issues. Local
Area Network and LAN Protocols: ETHERNET Protocols – VLAN protocols – Wireless LAN
Protocols – Metropolitan Area Network Protocol – Storage Area Network and SAN Protocols -
FDMA, WIFI and WIMAX Protocols- security issues. Mobile IP – Mobile Support Protocol for
IPv4 and IPv6 – Resource Reservation Protocol.
UNIT-III [14h]
Network Security and Technologies and Protocols: AAA Protocols – Tunneling Protocols –
Secured Routing Protocols – GRE- Generic Routing Encapsulation – IPSEC – Security
architecture for IP – IPSECAH – Authentication Header – ESP – IKE – ISAKMP and Key
management Protocol. IEEE 802.11 - Structure of 802.11 MAC – WEP- Problems with WEP –
Attacks and Risk- Station security – Access point Security – Gate way Security – Authentication
and Encryption.
IEEE 802.15 and Bluetooth: WPAN Communication Protocols – IEEE 802.16- IEEE
802.16A.WCDMA – Services – WCDMA Products – Networks- device addressing – System
Addressing – Radio Signaling Protocol – Multimedia Signaling Protocol.
Text Books:
2. Bruce Potter and Bob Fleck, “802.11 Security”, O’Reilly Publications, 2002.
Reference Material:
1. Ralph Oppliger “SSL and TSL: Theory and Practice”, Arttech House, 2009.
2. Lawrence Harte, “Introduction to CDMA- Network services Technologies and Operations”, Althos
Publishing, 2004.
The syllabus has been divided into three equal units. The paper setter is required to set ten questions in
all, three questions from each unit and a compulsory question consisting of five sub parts and based on
the whole syllabus. The candidate will be required to attempt six questions including the compulsory
question number no 1 and not more than two questions from each unit.
Program Outcome a b c d E f g h i j k
Mapping of Course
I,II,
outcome with Program
III
outcome
BS ES PD PC PE OE Project/Training
Category
Approval Date of meeting of the Board of Studies
Chandigarh University, Gharuan
Secured Network ProtocolsLab L T P C
Marks-100
Internal-40 External-60
Course Objectives
To identify and explain the concepts, policies, and technologies associated with a layered and
diversified defense-in-depth strategy.
To discuss the objectives of access control methods and describe how the available methods
are implemented in the defense of a network.
Unit Course Outcome
List of Experiments
UNIT-I
Department Teaching
Department of Computer Science and Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category
Marks-100
Internal-60 External-40
Course Objectives
The objective of the project is to enable the students to work on a project of latest topic /
research area / industrial applications preferably using the tool or language learnt in previous or
current semester. Each student shall have a guide who is a faculty member.